INFO: task kworker/0:1:11 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:11 tgid:11 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df845d84 r8:00000002 r7:60000113 r6:df845d8c r5:83238000 r4:83238000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83238000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df845e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f3040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83238000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0013000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589ef8c r4:8589ec00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589ef8c r4:830b8600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83238000 r8:830b862c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8600 r8:80287e08 r7:df83de60 r6:830b8680 r5:83238000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf845fb0 to 0xdf845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:830b51c0 INFO: task kworker/0:1:11 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ba1e3000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 INFO: task kworker/1:0:23 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df879d84 r8:00000002 r7:60000113 r6:df879d8c r5:83242400 r4:83242400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83242400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df879e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84957a40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83242400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e003d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848c738c r4:848c7000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848c738c r4:830cc080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83242400 r8:830cc0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830cc080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cc080 r8:80287e08 r7:df819d50 r6:830cc100 r5:83242400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:830cb100 INFO: task kworker/1:0:23 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: be661000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 INFO: task kworker/1:1:60 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:60 tgid:60 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df955d84 r8:00000002 r7:60000113 r6:df955d8c r5:83830000 r4:83830000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83830000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df955e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e56480 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83830000 r7:00000000 r6:83018200 r5:00001000 r4:7f135000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed343000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e8838c r4:85e88000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85e8838c r4:8329d080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83830000 r8:8329d0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8329d080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8329d080 r8:80287e08 r7:df879e60 r6:83884380 r5:83830000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf955fb0 to 0xdf955ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8329b040 INFO: task kworker/1:1:60 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: be661000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 INFO: task kworker/1:2:721 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:721 tgid:721 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e019dd84 r8:00000002 r7:60000113 r6:e019dd8c r5:83a73c00 r4:83a73c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a73c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e019de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84957040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83a73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb13000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848c6b8c r4:848c6800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848c6b8c r4:83b77480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a73c00 r8:83b774ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83b77480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83b77480 r8:80287e08 r7:df879e60 r6:83c09c00 r5:83a73c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe019dfb0 to 0xe019dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:83b781c0 INFO: task kworker/1:2:721 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: be661000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 INFO: task kworker/1:3:2888 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:2888 tgid:2888 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc2dd84 r8:00000002 r7:60000113 r6:ebc2dd8c r5:83a65400 r4:83a65400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a65400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc2de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85023b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83a65400 r7:00000000 r6:83018200 r5:00001000 r4:7f025000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df987000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85149b8c r4:85149800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85149b8c r4:84528280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a65400 r8:845282ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84528280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84528280 r8:80287e08 r7:df879e60 r6:84528200 r5:83a65400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc2dfb0 to 0xebc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:845275c0 INFO: task kworker/1:3:2888 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: be661000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 INFO: task kworker/1:4:2889 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:2889 tgid:2889 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebca9d84 r8:00000002 r7:60000113 r6:ebca9d8c r5:83a66c00 r4:83a66c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a66c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebca9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500d9c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83a66c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb61000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84429f8c r4:84429c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84429f8c r4:84528180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a66c00 r8:845281ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84528180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84528180 r8:80287e08 r7:ebc2de60 r6:84528100 r5:83a66c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebca9fb0 to 0xebca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:845275c0 INFO: task kworker/1:4:2889 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: be661000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 INFO: task kworker/0:4:3112 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3112 tgid:3112 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df979d84 r8:00000002 r7:60000013 r6:df979d8c r5:83d08c00 r4:83d08c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83d08c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df979e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849019c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83d08c00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f0f8c r4:850f0c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850f0f8c r4:84739600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83d08c00 r8:8473962c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84739600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84739600 r8:80287e08 r7:ec5f1e60 r6:84739580 r5:83d08c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf979fb0 to 0xdf979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8423e1c0 INFO: task kworker/0:4:3112 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: be661000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 INFO: task kworker/0:5:3113 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3113 tgid:3113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9cdd84 r8:00000002 r7:60000113 r6:df9cdd8c r5:83d0d400 r4:83d0d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83d0d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9cde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850163c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83d0d400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04c5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f078c r4:850f0400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850f078c r4:84739f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83d0d400 r8:84739f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84739f00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84739f00 r8:80287e08 r7:df979e60 r6:84739e80 r5:83d0d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9cdfb0 to 0xdf9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8423e1c0 INFO: task kworker/0:5:3113 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: be661000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 INFO: task kworker/1:5:3118 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3118 tgid:3118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9f9d84 r8:00000002 r7:60000113 r6:df9f9d8c r5:83d0e000 r4:83d0e000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83d0e000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85032300 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83d0e000 r7:00000000 r6:83018200 r5:00001000 r4:7f027000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b69b8c r4:84b69800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b69b8c r4:83aa9580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83d0e000 r8:83aa95ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83aa9580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83aa9580 r8:80287e08 r7:ebc2de60 r6:84739f80 r5:83d0e000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f9fb0 to 0xdf9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8457a880 INFO: task kworker/1:5:3118 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: be661000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 INFO: task kworker/1:6:3119 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3119 tgid:3119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9fdd84 r8:00000002 r7:60000113 r6:df9fdd8c r5:83d0a400 r4:83d0a400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83d0a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9fde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85088880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83d0a400 r7:00000000 r6:83018200 r5:00001000 r4:7f025000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e059d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b6ab8c r4:84b6a800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b6ab8c r4:83aa9500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83d0a400 r8:83aa952c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83aa9500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83aa9500 r8:80287e08 r7:ebc2de60 r6:84739e00 r5:83d0a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9fdfb0 to 0xdf9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8457aac0 INFO: task kworker/1:6:3119 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: be661000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3120 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3120 tgid:3120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa09d84 r8:00000002 r7:60000113 r6:dfa09d8c r5:83d0ec00 r4:83d0ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83d0ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa09e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84967900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83d0ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabc5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514838c r4:85148000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514838c r4:83aa9480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83d0ec00 r8:83aa94ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83aa9480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83aa9480 r8:80287e08 r7:ebc2de60 r6:84739080 r5:83d0ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa09fb0 to 0xdfa09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8457aac0 INFO: task kworker/1:7:3120 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: be661000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:6:3124 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3124 tgid:3124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df965d84 r8:00000002 r7:60000113 r6:df965d8c r5:83d09800 r4:83d09800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83d09800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df965e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597ce80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83d09800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec927000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a40f8c r4:85a40c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a40f8c r4:84739500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83d09800 r8:8473952c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84739500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84739500 r8:80287e08 r7:df979e60 r6:842b3600 r5:83d09800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf965fb0 to 0xdf965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8423ea00 INFO: task kworker/0:6:3124 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: be661000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:7:3125 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9f5d84 r8:00000002 r7:60000013 r6:df9f5d8c r5:83d0b000 r4:83d0b000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83d0b000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d1740 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83d0b000 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa97000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575d38c r4:8575d000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575d38c r4:842b3500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83d0b000 r8:842b352c r7:82804d40 r6:dddced80 r5:dddceda0 r4:842b3500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842b3500 r8:80287e08 r7:df965e60 r6:843ab000 r5:83d0b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8423ea00 INFO: task kworker/0:7:3125 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: be661000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3128 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa39d84 r8:00000002 r7:60000113 r6:dfa39d8c r5:8384b000 r4:8384b000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8384b000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa39e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85238f40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8384b000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac1d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514a38c r4:8514a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514a38c r4:83aa9380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8384b000 r8:83aa93ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83aa9380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83aa9380 r8:80287e08 r7:ebc2de60 r6:843ab080 r5:8384b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa39fb0 to 0xdfa39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8457aec0 INFO: task kworker/1:8:3128 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: be661000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3130 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa45d84 r8:00000002 r7:60000113 r6:dfa45d8c r5:83a58c00 r4:83a58c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a58c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa45e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85299b80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83a58c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc0b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514af8c r4:8514ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514af8c r4:83aa9300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a58c00 r8:83aa932c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83aa9300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83aa9300 r8:80287e08 r7:dfa39e60 r6:843ab100 r5:83a58c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa45fb0 to 0xdfa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8457a3c0 INFO: task kworker/1:9:3130 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: be661000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3133 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9b9d84 r8:00000002 r7:60000113 r6:df9b9d8c r5:843bc800 r4:843bc800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:843bc800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8457a380 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:843bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa27000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8442b38c r4:8442b000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8442b38c r4:83aa9280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:843bc800 r8:83aa92ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83aa9280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83aa9280 r8:80287e08 r7:dfa45e60 r6:83aa9200 r5:843bc800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9b9fb0 to 0xdf9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8457a680 INFO: task kworker/1:10:3133 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: be661000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3134 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:84275400 r4:84275400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84275400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b8980 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84275400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88f9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532738c r4:85327000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532738c r4:83aa9180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84275400 r8:83aa91ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83aa9180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83aa9180 r8:80287e08 r7:df9b9e60 r6:843ab180 r5:84275400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84238040 INFO: task kworker/1:11:3134 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: be661000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3136 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3136 tgid:3136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa79d84 r8:00000002 r7:60000113 r6:dfa79d8c r5:84266000 r4:84266000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84266000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa79e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548a280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84266000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf91000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85327f8c r4:85327c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85327f8c r4:83aa9100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84266000 r8:83aa912c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83aa9100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83aa9100 r8:80287e08 r7:dfa65e60 r6:843ab200 r5:84266000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa79fb0 to 0xdfa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84238280 INFO: task kworker/1:12:3136 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3138 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3138 tgid:3138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa89d84 r8:00000002 r7:60000113 r6:dfa89d8c r5:84261800 r4:84261800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84261800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854687c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84261800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe19000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b6b8c r4:853b6800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b6b8c r4:83aa9080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84261800 r8:83aa90ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83aa9080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83aa9080 r8:80287e08 r7:dfa79e60 r6:843ab280 r5:84261800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa89fb0 to 0xdfa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84238140 INFO: task kworker/1:13:3138 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3139 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa8dd84 r8:00000002 r7:60000013 r6:dfa8dd8c r5:84260c00 r4:84260c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84260c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588800 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84260c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eada5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543738c r4:85437000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543738c r4:83aa9000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84260c00 r8:83aa902c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83aa9000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83aa9000 r8:80287e08 r7:dfa89e60 r6:843ab300 r5:84260c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84238140 INFO: task kworker/1:14:3139 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3141 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa95d84 r8:00000002 r7:60000113 r6:dfa95d8c r5:84262400 r4:84262400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84262400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa95e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85489d00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84262400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85434f8c r4:85434c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85434f8c r4:83aa9880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84262400 r8:83aa98ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83aa9880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83aa9880 r8:80287e08 r7:dfa8de60 r6:843ab380 r5:84262400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa95fb0 to 0xdfa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:842381c0 INFO: task kworker/1:15:3141 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3144 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfab1d84 r8:00000002 r7:60000113 r6:dfab1d8c r5:84265400 r4:84265400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84265400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f34c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84265400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac93000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85435b8c r4:85435800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85435b8c r4:83aa9600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84265400 r8:83aa962c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83aa9600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83aa9600 r8:80287e08 r7:dfa8de60 r6:843ab400 r5:84265400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84238600 INFO: task kworker/1:16:3144 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3145 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa5dd84 r8:00000002 r7:60000113 r6:dfa5dd8c r5:843b9800 r4:843b9800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:843b9800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855612c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:843b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb66b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85436f8c r4:85436c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85436f8c r4:83aa9c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:843b9800 r8:83aa9cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83aa9c80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83aa9c80 r8:80287e08 r7:dfa8de60 r6:83aa9b00 r5:843b9800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa5dfb0 to 0xdfa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:842381c0 INFO: task kworker/1:17:3145 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3148 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaadd84 r8:00000002 r7:60000113 r6:dfaadd8c r5:843be000 r4:843be000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:843be000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaade08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85627fc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:843be000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb84d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85437f8c r4:85437c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85437f8c r4:83aa9a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:843be000 r8:83aa9aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83aa9a80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83aa9a80 r8:80287e08 r7:dfa8de60 r6:83aa9a00 r5:843be000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaadfb0 to 0xdfaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84238800 INFO: task kworker/1:18:3148 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3149 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3149 tgid:3149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa51d84 r8:00000002 r7:60000113 r6:dfa51d8c r5:843bd400 r4:843bd400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:843bd400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa51e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85643140 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:843bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf17000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e4b8c r4:855e4800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e4b8c r4:83aa9800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:843bd400 r8:83aa982c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83aa9800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83aa9800 r8:80287e08 r7:dfaade60 r6:83aa9980 r5:843bd400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa51fb0 to 0xdfa51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84238800 INFO: task kworker/1:19:3149 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3152 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfac9d84 r8:00000002 r7:60000113 r6:dfac9d8c r5:843bec00 r4:843bec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:843bec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d6500 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:843bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaad000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e638c r4:855e6000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e638c r4:83aa9680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:843bec00 r8:83aa96ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83aa9680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83aa9680 r8:80287e08 r7:dfa51e60 r6:83aa9900 r5:843bec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84238b00 INFO: task kworker/1:20:3152 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3154 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfae1d84 r8:00000002 r7:60000113 r6:dfae1d8c r5:843b8000 r4:843b8000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:843b8000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ba740 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:843b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f025000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574ef8c r4:8574ec00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574ef8c r4:83aa9780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:843b8000 r8:83aa97ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83aa9780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83aa9780 r8:80287e08 r7:dfac9e60 r6:83aa9700 r5:843b8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84238c40 INFO: task kworker/1:21:3154 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3156 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb05d84 r8:00000002 r7:60000113 r6:dfb05d8c r5:84260000 r4:84260000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84260000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb05e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3200 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84260000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaef3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856fdf8c r4:856fdc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856fdf8c r4:83aa9b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84260000 r8:83aa9bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83aa9b80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83aa9b80 r8:80287e08 r7:dfae1e60 r6:843ab480 r5:84260000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb05fb0 to 0xdfb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8423e6c0 INFO: task kworker/1:22:3156 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3158 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfad5d84 r8:00000002 r7:60000013 r6:dfad5d8c r5:84250000 r4:84250000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84250000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85861f80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84250000 r7:00000000 r6:83018200 r5:00001000 r4:7f025000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85781f8c r4:85781c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85781f8c r4:83aa9c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84250000 r8:83aa9c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83aa9c00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83aa9c00 r8:80287e08 r7:dfae1e60 r6:83aa9d00 r5:84250000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8423e6c0 INFO: task kworker/1:23:3158 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3161 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb19d84 r8:00000002 r7:60000113 r6:dfb19d8c r5:83833c00 r4:83833c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83833c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb19e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85979c40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83833c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec62b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c278c r4:858c2400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858c278c r4:83aa9d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83833c00 r8:83aa9dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83aa9d80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83aa9d80 r8:80287e08 r7:dfad5e60 r6:83aa9e00 r5:83833c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb19fb0 to 0xdfb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:83d5d100 INFO: task kworker/1:24:3161 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3162 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb25d84 r8:00000002 r7:60000113 r6:dfb25d8c r5:83833000 r4:83833000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83833000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb25e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597cd40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83833000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec903000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a40b8c r4:85a40800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a40b8c r4:843ab500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83833000 r8:843ab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843ab500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843ab500 r8:80287e08 r7:df965e60 r6:83aa9e80 r5:83833000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb25fb0 to 0xdfb25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446b880 INFO: task kworker/0:8:3162 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3164 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb29d84 r8:00000002 r7:60000113 r6:dfb29d8c r5:83830c00 r4:83830c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83830c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb29e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589aa40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83830c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb01000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8442e38c r4:8442e000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8442e38c r4:83aa9f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83830c00 r8:83aa9f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83aa9f00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83aa9f00 r8:80287e08 r7:dfb19e60 r6:83aa9f80 r5:83830c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb29fb0 to 0xdfb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:83d5d280 INFO: task kworker/1:25:3164 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3170 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:83836c00 r4:83836c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83836c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85983580 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83836c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb387000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858fdb8c r4:858fd800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fdb8c r4:84900000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83836c00 r8:8490002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84900000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84900000 r8:80287e08 r7:dfb19e60 r6:84900080 r5:83836c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:83d5d780 INFO: task kworker/1:26:3170 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3171 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3171 tgid:3171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:83831800 r4:83831800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83831800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e2b40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83831800 r7:00000000 r6:83018200 r5:00001000 r4:7f027000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df971000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858fef8c r4:858fec00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fef8c r4:84900100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83831800 r8:8490012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84900100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84900100 r8:80287e08 r7:dfaf9e60 r6:84900180 r5:83831800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:83d5d780 INFO: task kworker/1:27:3171 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3172 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb55d84 r8:00000002 r7:60000113 r6:dfb55d8c r5:83832400 r4:83832400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83832400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb55e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e2c80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83832400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0547000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858ff38c r4:858ff000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858ff38c r4:84900200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83832400 r8:8490022c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84900200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84900200 r8:80287e08 r7:dfaede60 r6:84900280 r5:83832400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb55fb0 to 0xdfb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:83d5d780 INFO: task kworker/1:28:3172 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3175 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb5dd84 r8:00000002 r7:60000113 r6:dfb5dd8c r5:84256c00 r4:84256c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84256c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb5de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d58040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84256c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc13000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d16b8c r4:85d16800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d16b8c r4:84900400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84256c00 r8:8490042c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84900400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84900400 r8:80287e08 r7:dfb59e60 r6:84900480 r5:84256c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb5dfb0 to 0xdfb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:83d5d780 INFO: task kworker/1:30:3175 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3176 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb69d84 r8:00000002 r7:60000113 r6:dfb69d8c r5:84920000 r4:84920000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84920000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85980480 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84920000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec93b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4138c r4:85a41000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4138c r4:843ab580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84920000 r8:843ab5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843ab580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843ab580 r8:80287e08 r7:df965e60 r6:84900500 r5:84920000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb69fb0 to 0xdfb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446bf40 INFO: task kworker/0:9:3176 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3179 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb75d84 r8:00000002 r7:60000113 r6:dfb75d8c r5:84920c00 r4:84920c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84920c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb75e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d4300 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84920c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaa7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a41b8c r4:85a41800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a41b8c r4:843ab600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84920c00 r8:843ab62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843ab600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843ab600 r8:80287e08 r7:dfb69e60 r6:84900580 r5:84920c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb75fb0 to 0xdfb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446be40 INFO: task kworker/0:10:3179 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3181 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb89d84 r8:00000002 r7:60000113 r6:dfb89d8c r5:84921800 r4:84921800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84921800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb89e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d4400 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84921800 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df95d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a41f8c r4:85a41c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a41f8c r4:843ab680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84921800 r8:843ab6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843ab680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843ab680 r8:80287e08 r7:dfb75e60 r6:84900600 r5:84921800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb89fb0 to 0xdfb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446bac0 INFO: task kworker/0:11:3181 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3183 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3183 tgid:3183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb99d84 r8:00000002 r7:60000113 r6:dfb99d8c r5:84923000 r4:84923000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84923000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb99e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d4500 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84923000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaed000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4238c r4:85a42000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4238c r4:843ab780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84923000 r8:843ab7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843ab780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843ab780 r8:80287e08 r7:dfb89e60 r6:84900680 r5:84923000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb99fb0 to 0xdfb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446b100 INFO: task kworker/0:12:3183 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3185 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb41d84 r8:00000002 r7:60000113 r6:dfb41d8c r5:84264800 r4:84264800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84264800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb41e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d4640 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84264800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb171000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4278c r4:85a42400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4278c r4:843ab700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84264800 r8:843ab72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843ab700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843ab700 r8:80287e08 r7:dfb99e60 r6:843ab800 r5:84264800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb41fb0 to 0xdfb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84390d00 INFO: task kworker/0:13:3185 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3187 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfba9d84 r8:00000002 r7:60000113 r6:dfba9d8c r5:84263000 r4:84263000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84263000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d4900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84263000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb689000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4338c r4:85a43000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4338c r4:843ab880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84263000 r8:843ab8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843ab880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843ab880 r8:80287e08 r7:dfb41e60 r6:843ab900 r5:84263000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba9fb0 to 0xdfba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84904000 INFO: task kworker/0:14:3187 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3189 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb8dd84 r8:00000002 r7:60000113 r6:dfb8dd8c r5:84274800 r4:84274800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84274800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d4740 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84274800 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5ab000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a42b8c r4:85a42800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a42b8c r4:843ab980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84274800 r8:843ab9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843ab980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843ab980 r8:80287e08 r7:dfba9e60 r6:843aba00 r5:84274800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb8dfb0 to 0xdfb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84904000 INFO: task kworker/0:15:3189 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3192 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbbdd84 r8:00000002 r7:60000113 r6:dfbbdd8c r5:84465400 r4:84465400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84465400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d4840 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84465400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb61f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a42f8c r4:85a42c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a42f8c r4:843aba80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84465400 r8:843abaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843aba80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843aba80 r8:80287e08 r7:dfba9e60 r6:843abb00 r5:84465400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84904500 INFO: task kworker/0:16:3192 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3194 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbc9d84 r8:00000002 r7:60000113 r6:dfbc9d8c r5:84466000 r4:84466000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84466000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d4a00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84466000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb70f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4378c r4:85a43400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4378c r4:843abb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84466000 r8:843abbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843abb80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843abb80 r8:80287e08 r7:dfba9e60 r6:843abc00 r5:84466000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc9fb0 to 0xdfbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84904340 INFO: task kworker/0:17:3194 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3195 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbd5d84 r8:00000002 r7:60000113 r6:dfbd5d8c r5:84466c00 r4:84466c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84466c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d4e00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84466c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba01000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4478c r4:85a44400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4478c r4:843abc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84466c00 r8:843abcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843abc80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843abc80 r8:80287e08 r7:dfbc9e60 r6:843abd00 r5:84466c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd5fb0 to 0xdfbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84904680 INFO: task kworker/0:18:3195 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3197 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3197 tgid:3197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbe1d84 r8:00000002 r7:60000113 r6:dfbe1d8c r5:84460000 r4:84460000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84460000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d4b40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84460000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb775000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a43b8c r4:85a43800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a43b8c r4:843abd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84460000 r8:843abdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843abd80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843abd80 r8:80287e08 r7:dfbd5e60 r6:843abe00 r5:84460000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe1fb0 to 0xdfbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84904640 INFO: task kworker/0:19:3197 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3199 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbf9d84 r8:00000002 r7:60000113 r6:dfbf9d8c r5:84460c00 r4:84460c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84460c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d4d00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84460c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8c7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4438c r4:85a44000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4438c r4:843abe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84460c00 r8:843abeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843abe80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843abe80 r8:80287e08 r7:dfbd5e60 r6:843abf00 r5:84460c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf9fb0 to 0xdfbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84904a00 INFO: task kworker/0:20:3199 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3201 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3201 tgid:3201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc05d84 r8:00000002 r7:60000113 r6:dfc05d8c r5:84462400 r4:84462400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84462400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc05e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d4f00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84462400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba63000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a44b8c r4:85a44800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a44b8c r4:843abf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84462400 r8:843abfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843abf80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843abf80 r8:80287e08 r7:dfbd5e60 r6:8423b000 r5:84462400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc05fb0 to 0xdfc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849048c0 INFO: task kworker/0:21:3201 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beb95000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3203 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc11d84 r8:00000002 r7:60000013 r6:dfc11d8c r5:84463000 r4:84463000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84463000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc11e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d4fc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84463000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5d5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a44f8c r4:85a44c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a44f8c r4:8423b080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84463000 r8:8423b0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8423b080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8423b080 r8:80287e08 r7:dfc05e60 r6:8423b100 r5:84463000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc11fb0 to 0xdfc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84904c00 INFO: task kworker/0:22:3203 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3205 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3205 tgid:3205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc1dd84 r8:00000002 r7:60000113 r6:dfc1dd8c r5:8337ec00 r4:8337ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8337ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc1de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597cf80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8337ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5f7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4538c r4:85a45000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4538c r4:8423b180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8337ec00 r8:8423b1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8423b180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8423b180 r8:80287e08 r7:dfc11e60 r6:8423b200 r5:8337ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84904e40 INFO: task kworker/0:23:3205 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3208 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc35d84 r8:00000002 r7:60000113 r6:dfc35d8c r5:84440000 r4:84440000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84440000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc35e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85979d40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84440000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec60d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4578c r4:85a45400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4578c r4:8423b280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84440000 r8:8423b2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8423b280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8423b280 r8:80287e08 r7:dfc1de60 r6:8423b300 r5:84440000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc35fb0 to 0xdfc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8439e100 INFO: task kworker/0:24:3208 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3209 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3209 tgid:3209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc39d84 r8:00000002 r7:60000013 r6:dfc39d8c r5:84445400 r4:84445400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84445400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc39e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e6bdc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84445400 r7:00000000 r6:83018200 r5:00001000 r4:7f183000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed277000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d8ef8c r4:85d8ec00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d8ef8c r4:84900780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84445400 r8:849007ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84900780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84900780 r8:80287e08 r7:dfb59e60 r6:8423b380 r5:84445400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc39fb0 to 0xdfc39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84ae25c0 INFO: task kworker/1:31:3209 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3210 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc3dd84 r8:00000002 r7:60000113 r6:dfc3dd8c r5:84441800 r4:84441800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84441800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc3de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d4f80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84441800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec61f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a45b8c r4:85a45800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a45b8c r4:8423b400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84441800 r8:8423b42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8423b400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8423b400 r8:80287e08 r7:dfc35e60 r6:8423b480 r5:84441800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc3dfb0 to 0xdfc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8439e2c0 INFO: task kworker/0:25:3210 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3213 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3213 tgid:3213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc51d84 r8:00000002 r7:60000013 r6:dfc51d8c r5:84440c00 r4:84440c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84440c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc51e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859de280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84440c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec671000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4638c r4:85a46000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4638c r4:8423b500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84440c00 r8:8423b52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8423b500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8423b500 r8:80287e08 r7:dfc3de60 r6:8423b580 r5:84440c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc51fb0 to 0xdfc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8439e5c0 INFO: task kworker/0:26:3213 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3216 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3216 tgid:3216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc71d84 r8:00000002 r7:60000113 r6:dfc71d8c r5:84444800 r4:84444800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84444800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc71e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859de380 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84444800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec68b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4678c r4:85a46400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4678c r4:8423b600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84444800 r8:8423b62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8423b600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8423b600 r8:80287e08 r7:dfc51e60 r6:8423b680 r5:84444800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc71fb0 to 0xdfc71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8439e800 INFO: task kworker/0:27:3216 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3218 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc79d84 r8:00000002 r7:60000113 r6:dfc79d8c r5:84446c00 r4:84446c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84446c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc79e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e6be80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84446c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6b9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d8f38c r4:85d8f000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d8f38c r4:84900800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84446c00 r8:8490082c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84900800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84900800 r8:80287e08 r7:dfb59e60 r6:8423b700 r5:84446c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc79fb0 to 0xdfc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84ae2a00 INFO: task kworker/1:32:3218 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3219 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3219 tgid:3219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc85d84 r8:00000002 r7:60000113 r6:dfc85d8c r5:84442400 r4:84442400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84442400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc85e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae26c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84442400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec67f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d8f78c r4:85d8f400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d8f78c r4:84900880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84442400 r8:849008ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84900880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84900880 r8:80287e08 r7:dfb59e60 r6:8423b780 r5:84442400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc85fb0 to 0xdfc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84ae28c0 INFO: task kworker/1:33:3219 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3221 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3221 tgid:3221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc8dd84 r8:00000002 r7:60000013 r6:dfc8dd8c r5:84461800 r4:84461800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84461800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc8de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e61ec0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84461800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed233000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d8fb8c r4:85d8f800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d8fb8c r4:84900900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84461800 r8:8490092c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84900900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84900900 r8:80287e08 r7:dfb59e60 r6:8423b800 r5:84461800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc8dfb0 to 0xdfc8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84ae2a40 INFO: task kworker/1:34:3221 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3223 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3223 tgid:3223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc89d84 r8:00000002 r7:60000113 r6:dfc89d8c r5:84464800 r4:84464800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84464800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc89e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859de4c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84464800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6ab000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a46b8c r4:85a46800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a46b8c r4:8423b880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84464800 r8:8423b8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8423b880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8423b880 r8:80287e08 r7:dfc71e60 r6:8423b900 r5:84464800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc89fb0 to 0xdfc89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8439ed00 INFO: task kworker/0:28:3223 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3225 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3225 tgid:3225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfca1d84 r8:00000002 r7:60000113 r6:dfca1d8c r5:84443c00 r4:84443c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84443c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859de600 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84443c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6dd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a46f8c r4:85a46c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a46f8c r4:8423b980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84443c00 r8:8423b9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8423b980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8423b980 r8:80287e08 r7:dfc89e60 r6:8423ba00 r5:84443c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca1fb0 to 0xdfca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8439ed80 INFO: task kworker/0:29:3225 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3227 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3227 tgid:3227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcb9d84 r8:00000002 r7:60000013 r6:dfcb9d8c r5:849b1800 r4:849b1800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849b1800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e56300 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:849b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f119000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed31b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8442fb8c r4:8442f800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8442fb8c r4:84900980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849b1800 r8:849009ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84900980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84900980 r8:80287e08 r7:dfb59e60 r6:8423ba80 r5:849b1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb9fb0 to 0xdfcb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84ae2c80 INFO: task kworker/1:35:3227 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3228 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3228 tgid:3228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcbdd84 r8:00000002 r7:60000113 r6:dfcbdd8c r5:849b2400 r4:849b2400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849b2400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcbde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859de700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec745000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4738c r4:85a47000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4738c r4:8423bb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849b2400 r8:8423bb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8423bb00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8423bb00 r8:80287e08 r7:dfca1e60 r6:8423bb80 r5:849b2400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcbdfb0 to 0xdfcbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84904cc0 INFO: task kworker/0:30:3228 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3231 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcc9d84 r8:00000002 r7:60000113 r6:dfcc9d8c r5:849b3000 r4:849b3000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849b3000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859de900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7a7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a47b8c r4:85a47800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a47b8c r4:8423bc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849b3000 r8:8423bcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8423bc80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8423bc80 r8:80287e08 r7:dfcbde60 r6:8423bd00 r5:849b3000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc9fb0 to 0xdfcc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84905100 INFO: task kworker/0:31:3231 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3233 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3233 tgid:3233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbedd84 r8:00000002 r7:60000113 r6:dfbedd8c r5:849b3c00 r4:849b3c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849b3c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbede08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859de800 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec78b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4778c r4:85a47400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4778c r4:8423bd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849b3c00 r8:8423bdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8423bd80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8423bd80 r8:80287e08 r7:dfcc9e60 r6:8423be00 r5:849b3c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbedfb0 to 0xdfbedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84905280 INFO: task kworker/0:32:3233 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3235 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3235 tgid:3235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcddd84 r8:00000002 r7:60000113 r6:dfcddd8c r5:849b4800 r4:849b4800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849b4800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcdde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859dea00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7bd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a47f8c r4:85a47c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a47f8c r4:8423be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849b4800 r8:8423beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8423be80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8423be80 r8:80287e08 r7:dfcc9e60 r6:8423bf00 r5:849b4800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcddfb0 to 0xdfcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84905280 INFO: task kworker/0:33:3235 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3236 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3236 tgid:3236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc29d84 r8:00000002 r7:60000113 r6:dfc29d8c r5:84925400 r4:84925400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84925400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc29e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859deac0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84925400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7dd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4838c r4:85a48000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4838c r4:8423bf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84925400 r8:8423bfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8423bf80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8423bf80 r8:80287e08 r7:dfcdde60 r6:84900a00 r5:84925400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc29fb0 to 0xdfc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849056c0 INFO: task kworker/0:34:3236 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3238 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3238 tgid:3238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcf1d84 r8:00000002 r7:60000013 r6:dfcf1d8c r5:84926000 r4:84926000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84926000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f7040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84926000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9cb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a49b8c r4:85a49800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a49b8c r4:84740000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84926000 r8:8474002c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84740000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84740000 r8:80287e08 r7:dfc29e60 r6:84900a80 r5:84926000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf1fb0 to 0xdfcf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84905640 INFO: task kworker/0:35:3238 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3240 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcadd84 r8:00000002 r7:60000013 r6:dfcadd8c r5:84926c00 r4:84926c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84926c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcade08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e565c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84926c00 r7:00000000 r6:83018200 r5:00001000 r4:7f139000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed40f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e88b8c r4:85e88800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85e88b8c r4:84900b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84926c00 r8:84900b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84900b00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84900b00 r8:80287e08 r7:dfb59e60 r6:84900b80 r5:84926c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcadfb0 to 0xdfcadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84ae2f80 INFO: task kworker/1:36:3240 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3243 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3243 tgid:3243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd15d84 r8:00000002 r7:60000013 r6:dfd15d8c r5:84924800 r4:84924800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84924800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd15e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859defc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84924800 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec99b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4978c r4:85a49400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4978c r4:84740080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84924800 r8:847400ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84740080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84740080 r8:80287e08 r7:dfcf1e60 r6:84900c00 r5:84924800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd15fb0 to 0xdfd15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84905980 INFO: task kworker/0:36:3243 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3244 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3244 tgid:3244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd09d84 r8:00000002 r7:60000013 r6:dfd09d8c r5:849b6000 r4:849b6000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849b6000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd09e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859def00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec98b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4938c r4:85a49000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4938c r4:84740100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849b6000 r8:8474012c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84740100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84740100 r8:80287e08 r7:dfd15e60 r6:84740180 r5:849b6000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd09fb0 to 0xdfd09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84905a00 INFO: task kworker/0:37:3244 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3247 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd25d84 r8:00000002 r7:60000013 r6:dfd25d8c r5:84923c00 r4:84923c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84923c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd25e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859dee00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84923c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec85d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a48f8c r4:85a48c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a48f8c r4:84740200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84923c00 r8:8474022c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84740200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84740200 r8:80287e08 r7:dfd09e60 r6:84900c80 r5:84923c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd25fb0 to 0xdfd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84905c80 INFO: task kworker/0:38:3247 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:39:3250 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:39 state:D stack:0 pid:3250 tgid:3250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd41d84 r8:00000002 r7:60000013 r6:dfd41d8c r5:84929800 r4:84929800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84929800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd41e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ded00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84929800 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec839000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a48b8c r4:85a48800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a48b8c r4:84740280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84929800 r8:847402ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84740280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84740280 r8:80287e08 r7:dfd25e60 r6:84900d00 r5:84929800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd41fb0 to 0xdfd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84905d00 INFO: task kworker/0:39:3250 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:41:3253 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:3253 tgid:3253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd55d84 r8:00000002 r7:60000013 r6:dfd55d8c r5:8492b000 r4:8492b000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8492b000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd55e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859debc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8492b000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec803000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4878c r4:85a48400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4878c r4:84740380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492b000 r8:847403ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84740380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84740380 r8:80287e08 r7:dfd4de60 r6:84900e00 r5:8492b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd55fb0 to 0xdfd55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84905ec0 INFO: task kworker/0:41:3253 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:3254 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:3254 tgid:3254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd59d84 r8:00000002 r7:60000113 r6:dfd59d8c r5:8492bc00 r4:8492bc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8492bc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd59e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f7440 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8492bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecae3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4a38c r4:85a4a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4a38c r4:84740400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492bc00 r8:8474042c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84740400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84740400 r8:80287e08 r7:dfd4de60 r6:84900e80 r5:8492bc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd59fb0 to 0xdfd59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84905a80 INFO: task kworker/0:42:3254 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:134:3611 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:134 state:D stack:0 pid:3611 tgid:3611 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0025d84 r8:00000002 r7:60000113 r6:e0025d8c r5:84b2d400 r4:84b2d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b2d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0025e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849560c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84b2d400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff63000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4038c r4:84b40000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b4038c r4:848dae80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2d400 r8:848daeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848dae80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dae80 r8:80287e08 r7:df879e60 r6:84751300 r5:84b2d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0025fb0 to 0xe0025ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848d8f00 INFO: task kworker/1:134:3611 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:121:3615 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:121 state:D stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0035d84 r8:00000002 r7:60000013 r6:e0035d8c r5:84b2ec00 r4:84b2ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b2ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0035e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446aa00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a78c r4:84a3a400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a78c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 INFO: task kworker/0:121:3615 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:122:3617 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:122 state:D stack:0 pid:3617 tgid:3617 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e015dd84 r8:00000002 r7:60000113 r6:e015dd8c r5:84a08000 r4:84a08000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a08000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e015de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446ab80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a08000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe53000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3ab8c r4:84a3a800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3ab8c r4:84751580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a08000 r8:847515ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751580 r8:80287e08 r7:e0035e60 r6:84751600 r5:84a08000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe015dfb0 to 0xe015dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a800 INFO: task kworker/0:122:3617 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:123:3619 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:123 state:D stack:0 pid:3619 tgid:3619 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0161d84 r8:00000002 r7:60000013 r6:e0161d8c r5:84a08c00 r4:84a08c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a08c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0161e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446ad00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a08c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe71000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3af8c r4:84a3ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3af8c r4:84751680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a08c00 r8:847516ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751680 r8:80287e08 r7:e015de60 r6:84751700 r5:84a08c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0161fb0 to 0xe0161ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a980 INFO: task kworker/0:123:3619 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:124:3621 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:124 state:D stack:0 pid:3621 tgid:3621 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e016dd84 r8:00000002 r7:60000113 r6:e016dd8c r5:84843000 r4:84843000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84843000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e016de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446ae40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84843000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe87000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3b38c r4:84a3b000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3b38c r4:84751780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84843000 r8:847517ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751780 r8:80287e08 r7:e0161e60 r6:848daf00 r5:84843000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe016dfb0 to 0xe016dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446ab00 INFO: task kworker/0:124:3621 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000001 INFO: task kworker/0:125:3624 blocked for more than 452 seconds. r4:847f3000 r4:00000000 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:847f3000 r8:8475182c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 INFO: task kworker/0:126:3625 blocked for more than 452 seconds. r10:8291a684 r9:e017dd84 r8:00000002 r7:60000013 r6:e017dd8c r5:84846c00 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84b40f8c r4:84b40c00 r7:dddced80 r6:83018000 r5:84b40f8c r4:84751880 r4:00000001 r4:8446acc0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf001000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:127:3626 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:127 state:D stack:0 pid:3626 tgid:3626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0181d84 r8:00000002 r7:60000113 r6:e0181d8c r5:84846000 r4:84846000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84846000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0181e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848d8500 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84846000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff2f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3bb8c r4:84a3b800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3bb8c r4:84751900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84846000 r8:8475192c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751900 r8:80287e08 r7:e017de60 r6:84959080 r5:84846000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0181fb0 to 0xe0181ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446acc0 INFO: task kworker/0:127:3626 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 r4:82ac21e4 r4:00000000 r5:00001000 r4:dfd49000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84849800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e018de08 r5:00001000 r4:dff4b000 r5:84a3bf8c r4:84a3bc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3bf8c r4:84751980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84849800 r8:847519ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751980 r8:80287e08 r7:e017de60 r6:84959100 r5:84849800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe018dfb0 to 0xe018dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848caf00 INFO: task kworker/0:128:3629 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 INFO: task kworker/0:129:3630 blocked for more than 452 seconds. r10:8291a684 r9:e01a1d84 r8:00000002 r7:60000113 r6:e01a1d8c r5:84848000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84848000 r8:84751a2c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 r4:dffe1dc0 r5:84a3a38c r4:84a3a000 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 task:kworker/1:135 state:D stack:0 pid:3632 tgid:3632 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0189e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:848c678c r4:84959200 r10:00000000 r9:84959200 r8:80287e08 r7:df879e60 r6:84959280 r5:8484a400 r4:846fe880 INFO: task kworker/1:135:3632 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:130:3634 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:130 state:D stack:0 pid:3634 tgid:3634 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0165d84 r8:00000002 r7:60000113 r6:e0165d8c r5:8484b000 r4:8484b000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8484b000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0165e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84956480 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8484b000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b40b8c r4:84b40800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b40b8c r4:84751a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8484b000 r8:84751aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751a80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751a80 r8:80287e08 r7:e017de60 r6:84959300 r5:8484b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0165fb0 to 0xe0165ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84956000 INFO: task kworker/0:130:3634 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r5:84a3a38c r4:84a3a000 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 task:kworker/1:136 state:D stack:0 pid:3636 tgid:3636 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01a5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84957900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8484bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e001b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848c6f8c r4:848c6c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848c6f8c r4:84959380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8484bc00 r8:849593ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84959380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84959380 r8:80287e08 r7:df879e60 r6:84959400 r5:8484bc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01a5fb0 to 0xe01a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:846fe940 INFO: task kworker/1:136:3636 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 r5:84a3a38c r4:84a3a000 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:8484d400 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8484d400 r8:84751b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84956280 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r5:84b4178c r4:84b41400 r7:dddced80 r6:83018000 r5:84b4178c r4:84751b80 Exception stack(0xe012dfb0 to 0xe012dff8) r4:84956540 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:133:3643 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:133 state:D stack:0 pid:3643 tgid:3643 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e013dd84 r8:00000002 r7:60000013 r6:e013dd8c r5:8484ec00 r4:8484ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8484ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e013de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84956980 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8484ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa2d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b41b8c r4:84b41800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b41b8c r4:84751c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8484ec00 r8:84751c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751c00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751c00 r8:80287e08 r7:e012de60 r6:84959580 r5:8484ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe013dfb0 to 0xe013dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84956380 INFO: task kworker/0:133:3643 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:84b4238c r4:84b42000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84751c80 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 r4:dffe1dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 INFO: task kworker/0:135:3647 blocked for more than 452 seconds. task:kworker/0:135 state:D stack:0 pid:3647 tgid:3647 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e01a9d84 r8:00000002 r7:60000013 r6:e01a9d8c r5:84848c00 r4:84848c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84848c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01a9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84956ac0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84848c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa71000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b41f8c r4:84b41c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b41f8c r4:84751d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84848c00 r8:84751d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751d00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751d00 r8:80287e08 r7:e0151e60 r6:84959680 r5:84848c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01a9fb0 to 0xe01a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84956740 INFO: task kworker/0:135:3647 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r5:84a3a38c r4:84a3a000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:136 state:D stack:0 pid:3649 tgid:3649 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01ade08 r9:83018005 r8:847f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 r5:84b4278c r4:84b42400 r10:61c88647 r9:847f0c00 r8:84751dac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:137:3651 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:137 state:D stack:0 pid:3651 tgid:3651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e01b1d84 r8:00000002 r7:60000013 r6:e01b1d8c r5:84850000 r4:84850000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84850000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01b1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84956f40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84850000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd6d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b42b8c r4:84b42800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b42b8c r4:84751e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84850000 r8:84751e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751e00 r8:80287e08 r7:e01ade60 r6:84959780 r5:84850000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01b1fb0 to 0xe01b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849569c0 INFO: task kworker/0:137:3651 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdffe1fb0 to 0xdffe1ff8) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:e0125d84 r8:00000002 r7:60000113 r6:e0125d8c r5:84850c00 r4:84850c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84850c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0125e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849568c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84850c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdb9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b42f8c r4:84b42c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b42f8c r4:84751e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84850c00 r8:84751eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751e80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751e80 r8:80287e08 r7:e01b1e60 r6:84959800 r5:84850c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0125fb0 to 0xe0125ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84956dc0 INFO: task kworker/0:138:3653 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r4:dffe1dc0 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 task:kworker/0:139 state:D stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84b4338c r4:84b43000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84751f00 r8:80287e08 r7:e0125e60 r6:84959880 r5:84851800 r4:84956e40 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:e04b9d84 r8:00000002 r7:60000113 r6:e04b9d8c r5:84852400 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84b4378c r4:84b43400 r7:dddced80 r6:83018000 r5:84b4378c r4:84751f80 r10:00000000 r9:84751f80 r8:80287e08 r7:e01b5e60 r6:84959900 r5:84852400 Exception stack(0xe04b9fb0 to 0xe04b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8457a900 INFO: task kworker/0:140:3658 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:141:3660 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:141 state:D stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04bdd84 r8:00000002 r7:60000113 r6:e04bdd8c r5:84853000 r4:84853000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84853000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04bde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84955340 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84853000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b43b8c r4:84b43800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b43b8c r4:8495c000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84853000 r8:8495c02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8495c000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8495c000 r8:80287e08 r7:e04b9e60 r6:84959980 r5:84853000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84955100 INFO: task kworker/0:141:3660 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/0:142:3662 blocked for more than 452 seconds. r4:84853c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04c1e08 r9:83018005 r8:84853c00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 r5:84b43f8c r4:84b43c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b43f8c r4:8495c080 r10:61c88647 r9:84853c00 r8:8495c0ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:143:3665 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:143 state:D stack:0 pid:3665 tgid:3665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04cdd84 r8:00000002 r7:60000013 r6:e04cdd8c r5:84856000 r4:84856000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84856000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04cde08 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:84856000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 r5:84b4838c r4:84b48000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4838c r4:8495c100 r10:61c88647 r9:84856000 r8:8495c12c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:8495c100 r8:80287e08 r7:e04c1e60 r6:84959a80 r5:84856000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 r4:82ac21e4 r4:dffe1dc0 r4:00000000 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r5:84a3a38c r4:84a3a000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:e04d1d84 r8:00000002 r7:60000113 r6:e04d1d8c r5:84856c00 r4:84856c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84856c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84955c80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84856c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e007b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b48f8c r4:84b48c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b48f8c r4:8495c180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84856c00 r8:8495c1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8495c180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8495c180 r8:80287e08 r7:e04cde60 r6:84959b00 r5:84856c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d1fb0 to 0xe04d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84955400 INFO: task kworker/0:144:3666 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:145:3668 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:145 state:D stack:0 pid:3668 tgid:3668 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0065d84 r8:00000002 r7:60000013 r6:e0065d8c r5:84a0bc00 r4:84a0bc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a0bc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0065e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849556c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a0bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0011000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4878c r4:84b48400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4878c r4:8495c200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a0bc00 r8:8495c22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8495c200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8495c200 r8:80287e08 r7:e04d1e60 r6:8495c280 r5:84a0bc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0065fb0 to 0xe0065ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84955680 INFO: task kworker/0:145:3668 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04c9d84 r8:00000002 r7:60000113 r6:e04c9d8c r5:84a0c800 r4:84a0c800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a0c800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04c9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84955b80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a0c800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0069000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b48b8c r4:84b48800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b48b8c r4:8495c300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a0c800 r8:8495c32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8495c300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8495c300 r8:80287e08 r7:e04d1e60 r6:8495c380 r5:84a0c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04c9fb0 to 0xe04c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84955540 INFO: task kworker/0:146:3669 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:137:3672 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:137 state:D stack:0 pid:3672 tgid:3672 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04ddd84 r8:00000002 r7:60000113 r6:e04ddd8c r5:84a0d400 r4:84a0d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a0d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:848c7f8c r4:848c7c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848c7f8c r4:84959b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a0d400 r8:84959bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:849578c0 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:00000000 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r5:84a3a38c r4:84a3a000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:138:3674 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:138 state:D stack:0 pid:3674 tgid:3674 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04d9d84 r8:00000002 r7:60000013 r6:e04d9d8c r5:84a0a400 r4:84a0a400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a0a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84957b80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84a0a400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00ab000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848c778c r4:848c7400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848c778c r4:84959c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a0a400 r8:84959c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84959c00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84959c00 r8:80287e08 r7:e04dde60 r6:8495c480 r5:84a0a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849578c0 INFO: task kworker/1:138:3674 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:147:3676 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:147 state:D stack:0 pid:3676 tgid:3676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04e5d84 r8:00000002 r7:60000013 r6:e04e5d8c r5:84a0b000 r4:84a0b000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a0b000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04e5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849550c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a0b000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e008f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4938c r4:84b49000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4938c r4:8495c500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a0b000 r8:8495c52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8495c500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8495c500 r8:80287e08 r7:e04d1e60 r6:8495c580 r5:84a0b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84955a80 INFO: task kworker/0:147:3676 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:148:3677 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:148 state:D stack:0 pid:3677 tgid:3677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04e9d84 r8:00000002 r7:60000013 r6:e04e9d8c r5:84a0e000 r4:84a0e000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a0e000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04e9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84747540 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a0e000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b49b8c r4:84b49800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b49b8c r4:8495c600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a0e000 r8:8495c62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8495c600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8495c600 r8:80287e08 r7:e04e5e60 r6:8495c680 r5:84a0e000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84955a80 INFO: task kworker/0:148:3677 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:149:3680 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:149 state:D stack:0 pid:3680 tgid:3680 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04edd84 r8:00000002 r7:60000013 r6:e04edd8c r5:84ad0000 r4:84ad0000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad0000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04ede08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r9:83018005 r8:84ad0000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r5:84b4978c r4:84b49400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4978c r4:8495c700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad0000 r8:8495c72c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04edfb0 to 0xe04edff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84956040 INFO: task kworker/0:149:3680 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:150:3682 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:150 state:D stack:0 pid:3682 tgid:3682 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04f5d84 r8:00000002 r7:60000013 r6:e04f5d8c r5:84ad1800 r4:84ad1800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad1800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847476c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ad1800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00db000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b49f8c r4:84b49c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b49f8c r4:8495c800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad1800 r8:8495c82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8495c800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8495c800 r8:80287e08 r7:e04e9e60 r6:8495c880 r5:84ad1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f5fb0 to 0xe04f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84955c00 INFO: task kworker/0:150:3682 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:00000000 Exception stack(0xdffe1d28 to 0xdffe1d70) 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:00000000 r5:00001000 r4:dfd49000 r5:84a3a38c r4:84a3a000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:139 state:D stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04f9d84 r8:00000002 r7:60000113 r6:e04f9d8c r5:84ad2400 r4:84ad2400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad2400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84957c80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ad2400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848c7b8c r4:848c7800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848c7b8c r4:84959c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad2400 r8:84959cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84959c80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84959c80 r8:80287e08 r7:e04dde60 r6:8495c900 r5:84ad2400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f9fb0 to 0xe04f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84957bc0 INFO: task kworker/1:139:3683 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:84ad3c00 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:84ad3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b50f8c r4:84b50c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b50f8c r4:84959d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad3c00 r8:84959d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84959d00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84959d00 r8:80287e08 r7:e04dde60 r6:8495c980 r5:84ad3c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0501fb0 to 0xe0501ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84957a80 INFO: task kworker/1:140:3685 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:151:3687 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:151 state:D stack:0 pid:3687 tgid:3687 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0505d84 r8:00000002 r7:60000113 r6:e0505d8c r5:84ad3000 r4:84ad3000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad3000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0505e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84747840 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ad3000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00eb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4a38c r4:84b4a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4a38c r4:8495ca00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad3000 r8:8495ca2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8495ca00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8495ca00 r8:80287e08 r7:e04f5e60 r6:8495ca80 r5:84ad3000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0505fb0 to 0xe0505ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:847474c0 INFO: task kworker/0:151:3687 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:152:3690 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:152 state:D stack:0 pid:3690 tgid:3690 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04fdd84 r8:00000002 r7:60000013 r6:e04fdd8c r5:84ad0c00 r4:84ad0c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad0c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04fde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r4:00000000 r5:00001000 r4:e010f000 r5:84b4ab8c r4:84b4a800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ab8c r4:8495cb00 r10:61c88647 r9:84ad0c00 r8:8495cb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:00000000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 r4:848d9e00 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:153:3691 blocked for more than 453 seconds. r10:8291a684 r9:e0509d84 r8:00000002 r7:60000113 r6:e0509d8c r5:84ad5400 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0509e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84747940 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ad5400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00fd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4a78c r4:84b4a400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4a78c r4:8495cc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad5400 r8:8495cc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8495cc00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8495cc00 r8:80287e08 r7:e04fde60 r6:8495cc80 r5:84ad5400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0509fb0 to 0xe0509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84747500 INFO: task kworker/0:153:3691 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:154:3694 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:154 state:D stack:0 pid:3694 tgid:3694 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0159d84 r8:00000002 r7:60000113 r6:e0159d8c r5:84ad6000 r4:84ad6000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad6000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0159e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84747dc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ad6000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e011d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4af8c r4:84b4ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4af8c r4:8495cd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad6000 r8:8495cd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8495cd00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8495cd00 r8:80287e08 r7:e04fde60 r6:8495cd80 r5:84ad6000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0159fb0 to 0xe0159ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84747a00 INFO: task kworker/0:154:3694 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:155:3695 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:155 state:D stack:0 pid:3695 tgid:3695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04d5d84 r8:00000002 r7:60000113 r6:e04d5d8c r5:84ad6c00 r4:84ad6c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad6c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84747e80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ad6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0133000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4b38c r4:84b4b000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4b38c r4:8495ce00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad6c00 r8:8495ce2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8495ce00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8495ce00 r8:80287e08 r7:e0159e60 r6:8495ce80 r5:84ad6c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d5fb0 to 0xe04d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84747a00 INFO: task kworker/0:155:3695 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:156:3698 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:156 state:D stack:0 pid:3698 tgid:3698 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e050dd84 r8:00000002 r7:60000013 r6:e050dd8c r5:84ad4800 r4:84ad4800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad4800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:84b4b78c r4:84b4b400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4b78c r4:8495cf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad4800 r8:8495cf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8495cf00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8495cf00 r8:80287e08 r7:e04d5e60 r6:8495cf80 r5:84ad4800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe050dfb0 to 0xe050dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84747d00 INFO: task kworker/0:156:3698 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:157:3700 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:157 state:D stack:0 pid:3700 tgid:3700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0515d84 r8:00000002 r7:60000113 r6:e0515d8c r5:84a0ec00 r4:84a0ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a0ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0515e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r9:83018005 r8:84a0ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 r5:84b4bb8c r4:84b4b800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4bb8c r4:8430f000 r10:61c88647 r9:84a0ec00 r8:8430f02c r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:00000000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84a3a38c r4:84a3a000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:158:3702 blocked for more than 453 seconds. task:kworker/0:158 state:D stack:0 pid:3702 tgid:3702 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0521d84 r8:00000002 r7:60000113 r6:e0521d8c r5:84a09800 r4:84a09800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a09800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0521e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8495e280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a09800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0529000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4bf8c r4:84b4bc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4bf8c r4:8430f100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a09800 r8:8430f12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8430f100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8430f100 r8:80287e08 r7:e0515e60 r6:8430f180 r5:84a09800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0521fb0 to 0xe0521ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8495e1c0 INFO: task kworker/0:158:3702 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:159:3705 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:159 state:D stack:0 pid:3705 tgid:3705 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e052dd84 r8:00000002 r7:60000013 r6:e052dd8c r5:84b90000 r4:84b90000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b90000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e052de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8495e440 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b90000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0535000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5038c r4:84b50000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5038c r4:8430f200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b90000 r8:8430f22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8430f200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8430f200 r8:80287e08 r7:e0521e60 r6:8430f280 r5:84b90000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe052dfb0 to 0xe052dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8495e100 INFO: task kworker/0:159:3705 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:160:3706 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:160 state:D stack:0 pid:3706 tgid:3706 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0545d84 r8:00000002 r7:60000113 r6:e0545d8c r5:84b90c00 r4:84b90c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b90c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0545e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8495e5c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b90c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0541000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5078c r4:84b50400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5078c r4:8430f300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b90c00 r8:8430f32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8430f300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8430f300 r8:80287e08 r7:e052de60 r6:8430f380 r5:84b90c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8495e2c0 INFO: task kworker/0:160:3706 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:161:3708 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:161 state:D stack:0 pid:3708 tgid:3708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0551d84 r8:00000002 r7:60000013 r6:e0551d8c r5:84b92400 r4:84b92400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b92400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0551e08 r4:00000000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:84b92400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 r5:84b50b8c r4:84b50800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b50b8c r4:8430f400 r10:61c88647 r9:84b92400 r8:8430f42c r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:162:3710 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:162 state:D stack:0 pid:3710 tgid:3710 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e055dd84 r8:00000002 r7:60000013 r6:e055dd8c r5:84b93c00 r4:84b93c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b93c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e055de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8495ed80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b93c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0565000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5138c r4:84b51000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5138c r4:8430f500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b93c00 r8:8430f52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8430f500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8430f500 r8:80287e08 r7:e0551e60 r6:8430f580 r5:84b93c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8495e780 INFO: task kworker/0:162:3710 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:163:3711 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:163 state:D stack:0 pid:3711 tgid:3711 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e056dd84 r8:00000002 r7:60000113 r6:e056dd8c r5:84b94800 r4:84b94800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b94800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e056de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8495e980 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b94800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e057d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b51b8c r4:84b51800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b51b8c r4:8430f600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b94800 r8:8430f62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8430f600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8430f600 r8:80287e08 r7:e055de60 r6:8430f680 r5:84b94800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe056dfb0 to 0xe056dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8495eac0 INFO: task kworker/0:163:3711 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:164:3715 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:164 state:D stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0581d84 r8:00000002 r7:60000013 r6:e0581d8c r5:84b95400 r4:84b95400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b95400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0581e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8495ee80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b95400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0575000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5178c r4:84b51400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5178c r4:8430f700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b95400 r8:8430f72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8430f700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8430f700 r8:80287e08 r7:e056de60 r6:8430f780 r5:84b95400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8495ed00 INFO: task kworker/0:164:3715 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:165:3718 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:165 state:D stack:0 pid:3718 tgid:3718 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0569d84 r8:00000002 r7:60000113 r6:e0569d8c r5:84b93000 r4:84b93000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b93000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0569e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84965040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b93000 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0595000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5238c r4:84b52000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5238c r4:8430f800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b93000 r8:8430f82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8430f800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8430f800 r8:80287e08 r7:e056de60 r6:8430f880 r5:84b93000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0569fb0 to 0xe0569ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84955b00 INFO: task kworker/0:165:3718 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:166:3719 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:166 state:D stack:0 pid:3719 tgid:3719 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0511d84 r8:00000002 r7:60000013 r6:e0511d8c r5:84b96000 r4:84b96000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b96000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0511e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84955ac0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b96000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0589000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b51f8c r4:84b51c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b51f8c r4:8430f900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b96000 r8:8430f92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8430f900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8430f900 r8:80287e08 r7:e0569e60 r6:8430f980 r5:84b96000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0511fb0 to 0xe0511ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849650c0 INFO: task kworker/0:166:3719 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:167:3721 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:167 state:D stack:0 pid:3721 tgid:3721 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0599d84 r8:00000002 r7:60000113 r6:e0599d8c r5:84b96c00 r4:84b96c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b96c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0599e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84965300 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b96c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05a1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5278c r4:84b52400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5278c r4:8430fa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b96c00 r8:8430fa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8430fa00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8430fa00 r8:80287e08 r7:e0569e60 r6:8430fa80 r5:84b96c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0599fb0 to 0xe0599ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84965240 INFO: task kworker/0:167:3721 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:168:3723 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:168 state:D stack:0 pid:3723 tgid:3723 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05a5d84 r8:00000002 r7:60000113 r6:e05a5d8c r5:84b91800 r4:84b91800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b91800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05a5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849656c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b91800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05b9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b52f8c r4:84b52c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b52f8c r4:8430fb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b91800 r8:8430fb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8430fb00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8430fb00 r8:80287e08 r7:e0599e60 r6:8430fb80 r5:84b91800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05a5fb0 to 0xe05a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84965180 INFO: task kworker/0:168:3723 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:169:3724 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:169 state:D stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05b1d84 r8:00000002 r7:60000013 r6:e05b1d8c r5:84a48000 r4:84a48000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a48000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05b1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84965500 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a48000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05ad000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b52b8c r4:84b52800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b52b8c r4:8430fc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a48000 r8:8430fc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8430fc00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8430fc00 r8:80287e08 r7:e05a5e60 r6:8430fc80 r5:84a48000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05b1fb0 to 0xe05b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84965440 INFO: task kworker/0:169:3724 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:170:3728 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:170 state:D stack:0 pid:3728 tgid:3728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05bdd84 r8:00000002 r7:60000113 r6:e05bdd8c r5:84a48c00 r4:84a48c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a48c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05bde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849657c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a48c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5338c r4:84b53000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5338c r4:8430fd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a48c00 r8:8430fd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8430fd00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8430fd00 r8:80287e08 r7:e05a5e60 r6:8430fd80 r5:84a48c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05bdfb0 to 0xe05bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84965540 INFO: task kworker/0:170:3728 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:171:3729 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:171 state:D stack:0 pid:3729 tgid:3729 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05c9d84 r8:00000002 r7:60000013 r6:e05c9d8c r5:84a49800 r4:84a49800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a49800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05c9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84965980 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a49800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05f3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5378c r4:84b53400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5378c r4:8430fe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a49800 r8:8430fe2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8430fe00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8430fe00 r8:80287e08 r7:e05bde60 r6:8430fe80 r5:84a49800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c9fb0 to 0xe05c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849655c0 INFO: task kworker/0:171:3729 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:141:3732 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:141 state:D stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05e9d84 r8:00000002 r7:60000113 r6:e05e9d8c r5:84a4a400 r4:84a4a400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a4a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85032140 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84a4a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07b7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b6978c r4:84b69400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b6978c r4:84959d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4a400 r8:84959dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84959d80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84959d80 r8:80287e08 r7:e04dde60 r6:8430ff00 r5:84a4a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e9fb0 to 0xe05e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8500d040 INFO: task kworker/1:141:3732 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:84429b8c r4:84429800 r10:61c88647 r9:84a4b000 r8:8430ffac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0645fb0 to 0xe0645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84965800 INFO: task kworker/0:172:3733 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:173:3734 blocked for more than 453 seconds. r4:84a4bc00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84965b00 r5:84b53b8c r4:84b53800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0601fb0 to 0xe0601ff8) Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 r4:84a4c800 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:84b6838c r4:84b68000 r10:61c88647 r9:84a4c800 r8:84959e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:84a3a38c r4:84a3a000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0655e08 r9:83018005 r8:84a4e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 r5:84b53f8c r4:84b53c00 r10:61c88647 r9:84a4e000 r8:8500b22c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:175:3740 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:175 state:D stack:0 pid:3740 tgid:3740 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0661d84 r8:00000002 r7:60000113 r6:e0661d8c r5:84a4d400 r4:84a4d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a4d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0661e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85013040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0667000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bd438c r4:84bd4000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd438c r4:8500b300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:8500b32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8500b300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8500b300 r8:80287e08 r7:e0645e60 r6:8500b380 r5:84a4d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0661fb0 to 0xe0661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84965d40 INFO: task kworker/0:175:3740 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:176:3741 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:176 state:D stack:0 pid:3741 tgid:3741 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84ba8000 r4:00000000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85013280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ba8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0673000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bd478c r4:84bd4400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd478c r4:8500b400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba8000 r8:8500b42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8500b400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8500b400 r8:80287e08 r7:e0661e60 r6:8500b480 r5:84ba8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0665fb0 to 0xe0665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84965d40 INFO: task kworker/0:176:3741 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84bd538c r4:84bd5000 r10:61c88647 r9:84ba8c00 r8:8500b52c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:84ba9800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e067de08 r5:00001000 r4:e067f000 r5:84bd4b8c r4:84bd4800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8500b600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8500b600 r8:80287e08 r7:e0649e60 r6:8500b680 r5:84ba9800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe067dfb0 to 0xe067dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85013100 INFO: task kworker/0:178:3745 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:84baa400 r4:00000000 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84bd4f8c r4:8500b700 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xdffe1d28 to 0xdffe1d70) 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:180:3750 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:180 state:D stack:0 pid:3750 tgid:3750 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0671d84 r8:00000002 r7:60000013 r6:e0671d8c r5:84babc00 r4:84babc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84babc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0671e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85013900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84babc00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb33000 r5:84bd578c r4:84bd5400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84babc00 r8:8500b82c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r5:84a3a38c r4:84a3a000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84bd638c r4:84bd6000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd638c r4:8500b900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bad400 r8:8500b92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8500b900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8500b900 r8:80287e08 r7:e0671e60 r6:8500b980 r5:84bad400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffadfb0 to 0xdffadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85013780 INFO: task kworker/0:181:3752 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r5:84a3a38c r4:84a3a000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500dac0 r5:8442978c r4:84429400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8500ba00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:84baec00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 r5:84bd5b8c r4:84bd5800 r10:61c88647 r9:84baec00 r8:8500bf2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bf531000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:184:3758 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:184 state:D stack:0 pid:3758 tgid:3758 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0689d84 r8:00000002 r7:60000113 r6:e0689d8c r5:84bac800 r4:84bac800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bac800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0689e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85013f80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bac800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc15000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bd5f8c r4:84bd5c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd5f8c r4:8500bb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bac800 r8:8500bbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8500bb80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8500bb80 r8:80287e08 r7:dffade60 r6:8500bc00 r5:84bac800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0689fb0 to 0xe0689ff8) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:dffe1dc0 r5:00001000 r4:dfd49000 r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:185:3761 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:185 state:D stack:0 pid:3761 tgid:3761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dff91d84 r8:00000002 r7:60000113 r6:dff91d8c r5:84bab000 r4:84bab000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bab000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff91e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84957cc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bab000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc99000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bd678c r4:84bd6400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd678c r4:8500bc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bab000 r8:8500bcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8500bc80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8500bc80 r8:80287e08 r7:dffade60 r6:8500bd00 r5:84bab000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff91fb0 to 0xdff91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84965d40 INFO: task kworker/0:185:3761 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bfa4b000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r5:84ac0000 r4:8291a680 r4:00000000 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ac0000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcd7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bd6b8c r4:84bd6800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd6b8c r4:8500bd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ac0000 r8:8500bdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8500bd80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8500bd80 r8:80287e08 r7:dff91e60 r6:8500be00 r5:84ac0000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0691fb0 to 0xe0691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85018000 INFO: task kworker/0:186:3763 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bfa4b000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r4:00000000 r5:84a3a38c r4:84a3a000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:848cab40 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:8485bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 r5:84bd7b8c r4:84bd7800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe069dfb0 to 0xe069dff8) INFO: task kworker/0:187:3765 is blocked on a mutex likely owned by task kworker/0:115:3602. Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a5e08 r9:83018005 r8:84858000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 r5:00001000 r4:dfd01000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bd6f8c r4:84bd6c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd6f8c r4:8500bf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84858000 r8:8500bfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8500bf80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8500bf80 r8:80287e08 r7:e069de60 r6:84959f00 r5:84858000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a5fb0 to 0xe06a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:850181c0 INFO: task kworker/0:188:3767 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bfa4b000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:189:3768 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 task:kworker/0:189 state:D stack:0 pid:3768 tgid:3768 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a9e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd31000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bd738c r4:84bd7000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd738c r4:85019000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8485c800 r8:8501902c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85019000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85019000 r8:80287e08 r7:e069de60 r6:84959f80 r5:8485c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:850181c0 INFO: task kworker/0:189:3768 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bfa4b000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:190:3770 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:190 state:D stack:0 pid:3770 tgid:3770 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06b1d84 r8:00000002 r7:60000013 r6:e06b1d8c r5:8485e000 r4:8485e000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8485e000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85018640 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8485e000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd67000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bd778c r4:84bd7400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd778c r4:85019080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8485e000 r8:850190ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85019080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85019080 r8:80287e08 r7:e069de60 r6:85022000 r5:8485e000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:8485d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c5e08 r5:00001000 r4:dffa1000 r5:84be0b8c r4:84be0800 r7:dddced80 r6:83018000 r5:84be0b8c r4:85019100 r4:85019100 Exception stack(0xe06c5fb0 to 0xe06c5ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:192:3774 blocked for more than 453 seconds. r4:8485b000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85018880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8485b000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe7b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bd7f8c r4:84bd7c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd7f8c r4:85019180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8485b000 r8:850191ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85019180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85019180 r8:80287e08 r7:e06c5e60 r6:85022100 r5:8485b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85018440 INFO: task kworker/0:192:3774 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bfa4b000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:193:3777 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:193 state:D stack:0 pid:3777 tgid:3777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06d5d84 r8:00000002 r7:60000013 r6:e06d5d8c r5:8485ec00 r5:8485ec00 r4:8291a680 r4:00000000 r4:00000000 r5:84be038c r4:84be0000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85019200 r8:80287e08 r7:e06c5e60 r6:85022180 r5:8485ec00 INFO: task kworker/0:193:3777 is blocked on a mutex likely owned by task kworker/0:115:3602. r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bfa4b000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84be078c r4:84be0400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84be078c r4:85019280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84859800 r8:850192ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85019280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85019280 r8:80287e08 r7:e06c5e60 r6:85022200 r5:84859800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d9fb0 to 0xe06d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85018840 INFO: task kworker/0:194:3778 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bfa4b000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502c2c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84858c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff71000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b6878c r4:84b68400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b6878c r4:85022280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84858c00 r8:850222ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85022280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85022280 r8:80287e08 r7:e05e9e60 r6:85022300 r5:84858c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0695fb0 to 0xe0695ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8502c140 INFO: task kworker/1:143:3782 is blocked on a mutex likely owned by task kworker/0:115:3602. Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8485a400 r4:8291a680 r4:00000000 r9:83018005 r8:8485a400 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r5:84be1b8c r4:84be1800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe06d1fb0 to 0xe06d1ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:196 state:D stack:0 pid:3785 tgid:3785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06ddd84 r8:00000002 r7:60000013 r6:e06ddd8c r5:84a4ec00 r4:84a4ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a4ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06dde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85018e80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0f8c r4:84be0c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84be0f8c r4:85019380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:850193ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85019380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85019380 r8:80287e08 r7:e06d1e60 r6:85022400 r5:84a4ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06ddfb0 to 0xe06ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85018ac0 INFO: task kworker/0:196:3785 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bfa4b000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r5:84854800 r4:8291a680 r4:00000000 r4:00000000 r5:84b68b8c r4:84b68800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85022480 r8:80287e08 r7:e05e9e60 r6:85022500 r5:84854800 INFO: task kworker/1:144:3788 is blocked on a mutex likely owned by task kworker/0:115:3602. 1d20: bfa4b000 dfcef000 00000001 80239b98 7f0f1000 00000001 r4:dffe1dc0 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:197:3789 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:197 state:D stack:0 pid:3789 tgid:3789 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06e9d84 r8:00000002 r7:60000013 r6:e06e9d8c r5:84855400 r4:84855400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84855400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85018a00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84855400 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06bb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84be138c r4:84be1000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84855400 r8:8501942c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:85040000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 r5:84be1f8c r4:84be1c00 r10:61c88647 r9:85040000 r8:850194ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: bfa4b000 dfcef000 00000001 80239b98 7f0f1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:145:3792 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:145 state:D stack:0 pid:3792 tgid:3792 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06e1d84 r8:00000002 r7:60000113 r6:e06e1d8c r5:85040c00 r4:85040c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85040c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502c740 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85040c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06ef000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be178c r4:84be1400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be178c r4:85022680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85040c00 r8:850226ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85022680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85022680 r8:80287e08 r7:e05e9e60 r6:85022700 r5:85040c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e1fb0 to 0xe06e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8502c680 INFO: task kworker/1:145:3792 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bfa4b000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/1:146:3794 blocked for more than 453 seconds. r5:85041800 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502cb40 r5:84b68f8c r4:84b68c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe06fdfb0 to 0xe06fdff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:dffe1dc0 r5:00001000 r4:dfd49000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85042400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0719e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e4c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85042400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e072b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be278c r4:84be2400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84be278c r4:85019500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85042400 r8:8501952c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85019500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85019500 r8:80287e08 r7:e06ede60 r6:85022880 r5:85042400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0719fb0 to 0xe0719ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8501e080 INFO: task kworker/0:199:3797 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bfa4b000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 INFO: task kworker/0:200:3798 blocked for more than 454 seconds. r4:85043c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0729e08 r5:00001000 r4:e071b000 r5:84be238c r4:84be2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d60: 80230ad0 80239bb0 800f0113 ffffffff r4:dffe1dc0 r5:00001000 r4:dfd49000 r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/0:201:3800 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:201 state:D stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0709d84 r8:00000002 r7:60000013 r6:e0709d8c r5:84ac1800 r4:84ac1800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ac1800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0709e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e5c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ac1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0737000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be2b8c r4:84be2800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84be2b8c r4:85019600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ac1800 r8:8501962c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85019600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85019600 r8:80287e08 r7:e0719e60 r6:85019680 r5:84ac1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0709fb0 to 0xe0709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8501e180 INFO: task kworker/0:201:3800 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bfa4b000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/0:202:3803 blocked for more than 454 seconds. r4:84ac3000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f9e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84be2f8c r4:84be2c00 r10:61c88647 r9:84ac3000 r8:8501972c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:203:3805 blocked for more than 454 seconds. r5:84ac3c00 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84be338c r4:84be3000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84be338c r4:85019800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ac3c00 r8:8501982c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85019800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85019800 r8:80287e08 r7:e06f9e60 r6:85019880 r5:84ac3c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0741fb0 to 0xe0741ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8501e580 INFO: task kworker/0:203:3805 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bfa4b000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84ac4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 r5:84be378c r4:84be3400 r10:61c88647 r9:84ac4800 r8:8501992c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:205:3809 blocked for more than 454 seconds. r5:84ac5400 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84ac5400 r8:85019a2c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:206:3810 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:206 state:D stack:0 pid:3810 tgid:3810 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0735d84 r8:00000002 r7:60000013 r6:e0735d8c r5:84ac6c00 r4:84ac6c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ac6c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0735e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502c8c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ac6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e078b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b6938c r4:84b69000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b6938c r4:85019b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ac6c00 r8:85019b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85019b00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85019b00 r8:80287e08 r7:e0759e60 r6:85019b80 r5:84ac6c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0735fb0 to 0xe0735ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8501ea00 INFO: task kworker/0:206:3810 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bfa4b000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r4:84ac0c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0795e08 r9:83018005 r8:84ac0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be878c r4:84be8400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84be878c r4:85019c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ac0c00 r8:85019c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85019c00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85019c00 r8:80287e08 r7:e0735e60 r6:85019c80 r5:84ac0c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0795fb0 to 0xe0795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8501ed00 INFO: task kworker/0:207:3813 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bfa4b000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 INFO: task kworker/1:147:3814 blocked for more than 454 seconds. r4:84ab0000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0799e08 r9:83018205 r8:84ab0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 r5:84be3f8c r4:84be3c00 r10:61c88647 r9:84ab0000 r8:850229ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bfa4b000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84be838c r4:84be8000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85019d80 r8:80287e08 r7:e0795e60 r6:85019e00 r5:84ab0c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8501ed00 INFO: task kworker/0:208:3816 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bfa4b000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:00000000 r5:84a3a38c r4:84a3a000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85088ac0 r5:84b6b38c r4:84b6b000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85022a00 r8:80287e08 r7:e05e9e60 r6:85019e80 r5:84ab3000 INFO: task kworker/1:148:3818 is blocked on a mutex likely owned by task kworker/0:115:3602. 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07d9e08 r5:00001000 r4:df9db000 r5:84b69f8c r4:84b69c00 r10:61c88647 r9:84ab3c00 r8:85022aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: bfa4b000 dfcef000 00000001 80239b98 7f0f1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:209:3822 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:209 state:D stack:0 pid:3822 tgid:3822 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04e1d84 r8:00000002 r7:60000013 r6:e04e1d8c r5:84ab2400 r4:84ab2400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ab2400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04e1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85021a40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ab2400 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be8f8c r4:84be8c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84be8f8c r4:85019f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ab2400 r8:85019fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85019f80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85019f80 r8:80287e08 r7:e0795e60 r6:8502e000 r5:84ab2400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e1fb0 to 0xe04e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85021180 INFO: task kworker/0:209:3822 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bfa4b000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) r4:848cab40 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e066de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85032b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ab4800 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0199000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b6a38c r4:84b6a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b6a38c r4:85022b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ab4800 r8:85022b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85022b00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85022b00 r8:80287e08 r7:e07d5e60 r6:8502e080 r5:84ab4800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe066dfb0 to 0xe066dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85032200 INFO: task kworker/1:150:3825 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bfa4b000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 Workqueue: events bpf_prog_free_deferred r5:84ab6000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0679e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85021840 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ab6000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be8b8c r4:84be8800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84be8b8c r4:8502e100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ab6000 r8:8502e12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8502e100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8502e100 r8:80287e08 r7:e04e1e60 r6:8502e180 r5:84ab6000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85021740 INFO: task kworker/0:210:3828 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:848cab40 Workqueue: events bpf_prog_free_deferred r5:84ab6c00 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84be938c r4:8502e200 r10:00000000 r9:8502e200 r8:80287e08 r7:e04e1e60 r6:8502e280 r5:84ab6c00 INFO: task kworker/0:211:3830 is blocked on a mutex likely owned by task kworker/0:115:3602. 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:212:3832 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:212 state:D stack:0 pid:3832 tgid:3832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07e5d84 r8:00000002 r7:60000013 r6:e07e5d8c r5:84ac6000 r4:84ac6000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ac6000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07e5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85021f40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ac6000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd65000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be978c r4:84be9400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84be978c r4:8502e300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ac6000 r8:8502e32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8502e300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8502e300 r8:80287e08 r7:e0685e60 r6:8502e380 r5:84ac6000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85021ac0 INFO: task kworker/0:212:3832 is blocked on a mutex likely owned by task kworker/0:115:3602. r4:00000000 r5:800f0113 r4:80239bb0 r4:dffe1dc0 r5:00001000 r4:dfd49000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85021180 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ac2400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdcd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be9b8c r4:84be9800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84be9b8c r4:8502e400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ac2400 r8:8502e42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8502e400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8502e400 r8:80287e08 r7:e07e5e60 r6:8502e480 r5:84ac2400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e9fb0 to 0xe07e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85021780 INFO: task kworker/0:213:3833 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c3f6f000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:214:3836 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:214 state:D stack:0 pid:3836 tgid:3836 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:84ab1800 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be9f8c r4:84be9c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: c3f6f000 dfcef000 00000001 80239b98 7f0f1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:850211c0 INFO: task kworker/0:215:3838 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c4537000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:216:3840 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:216 state:D stack:0 pid:3840 tgid:3840 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:84830000 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84bea38c r4:84bea000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8502e700 r8:80287e08 r7:e0775e60 r6:8502e780 r5:84830000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84beb38c r4:8502e800 r10:00000000 r9:8502e800 r8:80287e08 r7:e0775e60 r6:8502e880 r5:84830c00 INFO: task kworker/0:217:3842 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c4b41000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:218:3843 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:218 state:D stack:0 pid:3843 tgid:3843 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07f5d84 r8:00000002 r7:60000013 r6:e07f5d8c r5:84831800 r4:84831800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84831800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07f5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85020480 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84831800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84beab8c r4:84bea800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: c4b41000 dfcef000 00000001 80239b98 7f0f1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:84832400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 r5:84beaf8c r4:84beac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: c4b41000 dfcef000 00000001 80239b98 7f0f1000 00000001 r4:dffe1dc0 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:220:3848 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:220 state:D stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4809d84 r8:00000002 r7:60000113 r6:e4809d8c r5:84833000 r4:84833000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84833000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4809e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85020b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84833000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0087000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bebb8c r4:84beb800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bebb8c r4:8502eb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84833000 r8:8502eb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8502eb00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8502eb00 r8:80287e08 r7:e07ede60 r6:8502eb80 r5:84833000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4809fb0 to 0xe4809ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/0:221:3849 blocked for more than 454 seconds. r5:84833c00 r4:8291a680 r4:00000000 r9:83018005 r8:84833c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 r5:84beb78c r4:84beb400 r10:61c88647 r9:84833c00 r8:8502ec2c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: c522b000 dfcef000 00000001 80239b98 7f0f1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:222:3852 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:222 state:D stack:0 pid:3852 tgid:3852 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4811d84 r8:00000002 r7:60000113 r6:e4811d8c r5:84834800 r4:84834800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84834800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4811e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85020c40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84834800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e009f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bebf8c r4:84bebc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bebf8c r4:8502ed80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84834800 r8:8502edac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8502ed80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8502ed80 r8:80287e08 r7:e4809e60 r6:8502ee00 r5:84834800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4811fb0 to 0xe4811ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85020c00 INFO: task kworker/0:222:3852 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c5606000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/0:223:3854 blocked for more than 454 seconds. r5:84835400 r4:8291a680 r4:00000000 r4:00000000 r5:84bf4b8c r4:84bf4800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84835400 r8:8502ed2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:84836000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r5:00001000 r4:e00b5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bf438c r4:84bf4000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bf438c r4:8502ef00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84836000 r8:8502ef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8502ef00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8502ef00 r8:80287e08 r7:e4815e60 r6:8502ef80 r5:84836000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4819fb0 to 0xe4819ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85020a00 INFO: task kworker/0:224:3856 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c5606000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:225:3858 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:225 state:D stack:0 pid:3858 tgid:3858 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e481dd84 r8:00000002 r7:60000113 r6:e481dd8c r5:84836c00 r4:84836c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84836c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e481de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85020f80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:84bf478c r4:84bf4400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8503b000 r8:80287e08 r7:e4815e60 r6:8503b080 r5:84836c00 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84bf5b8c r4:84bf5800 r10:61c88647 r9:850b8000 r8:8503b12c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8503e1c0 INFO: task kworker/0:226:3860 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c5dfe000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:227:3861 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:227 state:D stack:0 pid:3861 tgid:3861 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4851d84 r8:00000002 r7:60000113 r6:e4851d8c r5:850b8c00 r4:850b8c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850b8c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4851e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8503e280 r5:84bf4f8c r4:84bf4c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8503b180 Exception stack(0xe4851fb0 to 0xe4851ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r5:84a3a38c r4:84a3a000 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4859e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8503e400 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:850ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0109000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bf538c r4:84bf5000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bf538c r4:8503b200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850ba400 r8:8503b22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8503b200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503b200 r8:80287e08 r7:e484de60 r6:85022c80 r5:850ba400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4859fb0 to 0xe4859ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8503e340 INFO: task kworker/0:228:3863 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c5f2e000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:229:3865 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:229 state:D stack:0 pid:3865 tgid:3865 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:850bb000 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84bf578c r4:84bf5400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r9:83018005 r8:850bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 r5:84bf738c r4:84bf7000 r10:61c88647 r9:850bd400 r8:8503b32c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:231:3870 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:231 state:D stack:0 pid:3870 tgid:3870 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4871d84 r8:00000002 r7:60000113 r6:e4871d8c r5:850bc800 r4:850bc800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850bc800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4871e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8503e840 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:850bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04f1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bf5f8c r4:84bf5c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bf5f8c r4:8503b380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850bc800 r8:8503b3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8503b380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503b380 r8:80287e08 r7:e4869e60 r6:85022e00 r5:850bc800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4871fb0 to 0xe4871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8503e4c0 INFO: task kworker/0:231:3870 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c68d9000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84a3a38c r4:84a3a000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850884c0 r5:84b6a78c r4:84b6a400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:850bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r5:84bf638c r4:84bf6000 r10:61c88647 r9:850bbc00 r8:8503b42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8503b400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503b400 r8:80287e08 r7:e4869e60 r6:85022f80 r5:850bbc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8885fb0 to 0xe8885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8503e6c0 INFO: task kworker/0:232:3873 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c6d1b000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:233:3875 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:233 state:D stack:0 pid:3875 tgid:3875 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e487dd84 r8:00000002 r7:60000113 r6:e487dd8c r5:850bec00 r4:850bec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850bec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:850bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 r5:84bf678c r4:84bf6400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8503b480 r8:80287e08 r7:e4869e60 r6:85087080 r5:850bec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/0:234:3877 blocked for more than 454 seconds. r4:85044800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4855e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84bf6b8c r4:84bf6800 r10:61c88647 r9:85044800 r8:8503b52c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:235:3879 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:235 state:D stack:0 pid:3879 tgid:3879 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e888dd84 r8:00000002 r7:60000013 r6:e888dd8c r5:85046000 r4:85046000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85046000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e888de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8503edc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85046000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0571000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bf6f8c r4:84bf6c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bf6f8c r4:8503b600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85046000 r8:8503b62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8503b600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503b600 r8:80287e08 r7:e4869e60 r6:8503b680 r5:85046000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:85045400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8891e08 r9:83018005 r8:85045400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 r5:850f1f8c r4:850f1c00 r7:dddced80 r6:83018000 r5:850f1f8c r4:8503b700 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c7428000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:237:3884 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:237 state:D stack:0 pid:3884 tgid:3884 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e889dd84 r8:00000002 r7:60000113 r6:e889dd8c r5:85048c00 r4:85048c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85048c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e889de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501ec80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85048c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e058f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bf778c r4:84bf7400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bf778c r4:8503b800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85048c00 r8:8503b82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: c7eb0000 dfcef000 00000001 80239b98 7f0f1000 00000001 r4:dffe1dc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:152:3888 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:152 state:D stack:0 pid:3888 tgid:3888 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88a1d84 r8:00000002 r7:60000113 r6:e88a1d8c r5:85048000 r4:85048000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:84b6af8c r4:84b6ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c7eb0000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:153:3889 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:153 state:D stack:0 pid:3889 tgid:3889 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8899d84 r8:00000002 r7:60000013 r6:e8899d8c r5:8504a400 r4:8504a400 r5:8504a400 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:dfbdb000 r5:84b6bb8c r4:84b6b800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b6bb8c r4:85087280 r4:85087280 Exception stack(0xe8899fb0 to 0xe8899ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:dffe1dc0 r5:00001000 r4:dfd49000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:238:3892 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:238 state:D stack:0 pid:3892 tgid:3892 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4805d84 r8:00000002 r7:60000113 r6:e4805d8c r5:8504b000 r4:8504b000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8504b000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4805e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508a7c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8504b000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd5f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bf7b8c r4:84bf7800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bf7b8c r4:8503b880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8504b000 r8:8503b8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8503b880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:00000000 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/1:154:3893 blocked for more than 454 seconds. r4:8504bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b5e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b6b78c r4:84b6b400 r4:85087400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r4:00000000 r5:84a3a38c r4:84a3a000 r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/1:155:3895 blocked for more than 454 seconds. r4:85046c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0711e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8442a78c r4:8442a400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8442a78c r4:85087500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85046c00 r8:8508752c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85087500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85087500 r8:80287e08 r7:e8899e60 r6:8503b900 r5:85046c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0711fb0 to 0xe0711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85088c80 INFO: task kworker/1:155:3895 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c86e6000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:156:3897 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:156 state:D stack:0 pid:3897 tgid:3897 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0731d84 r8:00000002 r7:60000113 r6:e0731d8c r5:84a70c00 r4:84a70c00 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84a70c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 r5:84b6bf8c r4:84b6bc00 r10:61c88647 r9:84a70c00 r8:850875ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84a72400 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8442a38c r4:8442a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85087600 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:158:3901 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:158 state:D stack:0 pid:3901 tgid:3901 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0781d84 r8:00000002 r7:60000113 r6:e0781d8c r5:84a70000 r4:84a70000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a70000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0781e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85083180 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84a70000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe7f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b7878c r4:84b78400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7878c r4:85087680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a70000 r8:850876ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85087680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85087680 r8:80287e08 r7:e0749e60 r6:8503ba80 r5:84a70000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0781fb0 to 0xe0781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84a71800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 r5:84b7838c r4:84b78000 r4:85087700 1fa0: 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:160:3903 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:160 state:D stack:0 pid:3903 tgid:3903 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07b1d84 r8:00000002 r7:60000013 r6:e07b1d8c r5:84a73c00 r4:84a73c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a73c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508a8c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84a73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe4d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bf7f8c r4:84bf7c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bf7f8c r4:85087780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a73c00 r8:850877ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85087780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85087780 r8:80287e08 r7:e0781e60 r6:8503bb80 r5:84a73c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07b1fb0 to 0xe07b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8503e3c0 INFO: task kworker/1:160:3903 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:00000000 r5:00001000 r4:dfd49000 r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84a74800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f5e08 r5:00001000 r4:dfea9000 r5:84b78b8c r4:84b78800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a74800 r8:8508782c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85087800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85087800 r8:80287e08 r7:e0781e60 r6:8503bc00 r5:84a74800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f5fb0 to 0xe06f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8457ac40 INFO: task kworker/1:161:3907 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c9443000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r5:00001000 r4:dfd49000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84a76000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 r5:84b78f8c r4:84b78c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b78f8c r4:85087880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a76000 r8:850878ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85087880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85087880 r8:80287e08 r7:e06f5e60 r6:8503bc80 r5:84a76000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88a5fb0 to 0xe88a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:850831c0 INFO: task kworker/1:162:3909 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c987b000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/1:163:3912 blocked for more than 455 seconds. Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88b1d84 r8:00000002 r7:60000013 r6:e88b1d8c r5:84a73000 r4:84a73000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a73000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88b1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85083540 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84a73000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff77000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b7938c r4:84b79000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7938c r4:85087900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a73000 r8:8508792c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85087900 r10:00000000 r9:85087900 r8:80287e08 r7:e88a5e60 r6:8503bd00 r5:84a73000 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfd49000 r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:164:3913 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:164 state:D stack:0 pid:3913 tgid:3913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88b5d84 r8:00000002 r7:60000113 r6:e88b5d8c r5:84a76c00 r4:84a76c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a76c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88b5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85083800 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84a76c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffeb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b79b8c r4:84b79800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b79b8c r4:85087980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a76c00 r8:850879ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85087980 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:84b7978c r4:84b79400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85087a00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 r5:84a3a38c r4:84a3a000 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:166:3918 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:166 state:D stack:0 pid:3918 tgid:3918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88b9d84 r8:00000002 r7:60000113 r6:e88b9d8c r5:8504d400 r4:8504d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8504d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88b9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85083900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8504d400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e059f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b79f8c r4:84b79c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b79f8c r4:85087b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8504d400 r8:85087b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85087b00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85087b00 r8:80287e08 r7:e88b5e60 r6:85087b80 r5:8504d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88b9fb0 to 0xe88b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85083600 INFO: task kworker/1:166:3918 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ca4b4000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:84b7a38c r4:84b7a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:168:3922 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:168 state:D stack:0 pid:3922 tgid:3922 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88c1d84 r8:00000002 r7:60000113 r6:e88c1d8c r5:8504ec00 r4:8504ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8504ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88c1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85083ec0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8504ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05e4000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b7ab8c r4:84b7a800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7ab8c r4:85087d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8504ec00 r8:85087d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85087d00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85087d00 r8:80287e08 r7:e07bde60 r6:85087d80 r5:8504ec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfd49000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:85049800 r4:8291a680 r4:00000000 r4:00000000 r5:84b7bf8c r4:84b7bc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8503be00 r8:80287e08 r7:e8891e60 r6:85087e00 r5:85049800 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:84a3a38c r4:84a3a000 r4:848d9e00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:169:3924 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:169 state:D stack:0 pid:3924 tgid:3924 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88d1d84 r8:00000002 r7:60000113 r6:e88d1d8c r5:85043000 r4:85043000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85043000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88d1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85083c80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85043000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b7a78c r4:84b7a400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7a78c r4:85087e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85043000 r8:85087eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85087e80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85087e80 r8:80287e08 r7:e88c1e60 r6:85087f00 r5:85043000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88d1fb0 to 0xe88d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85083bc0 INFO: task kworker/1:169:3924 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: caddc000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:170:3927 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:170 state:D stack:0 pid:3927 tgid:3927 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88cdd84 r8:00000002 r7:60000013 r6:e88cdd8c r5:850b9800 r4:850b9800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850b9800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88cde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85083fc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:850b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05f5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b7af8c r4:84b7ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7af8c r4:85087f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850b9800 r8:85087fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85087f80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85087f80 r8:80287e08 r7:e88c1e60 r6:85087000 r5:850b9800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r5:00001000 r4:dfd49000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:171:3929 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:171 state:D stack:0 pid:3929 tgid:3929 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88d9d84 r8:00000002 r7:60000013 r6:e88d9d8c r5:85058000 r4:85058000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85058000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88d9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502f380 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e064d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b7b78c r4:84b7b400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7b78c r4:85039080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85058000 r8:850390ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85039080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85039080 r8:80287e08 r7:e88cde60 r6:85039100 r5:85058000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88d9fb0 to 0xe88d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8502f0c0 INFO: task kworker/1:171:3929 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85058c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 r5:84b7b38c r4:84b7b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:173:3933 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:173 state:D stack:0 pid:3933 tgid:3933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88e1d84 r8:00000002 r7:60000113 r6:e88e1d8c r5:85059800 r4:85059800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85059800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88e1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502f500 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85059800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0681000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b7bb8c r4:84b7b800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7bb8c r4:85039200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85039200 r8:80287e08 r7:e88d9e60 r6:85039280 r5:85059800 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdffe1fb0 to 0xdffe1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8505a400 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e072d000 r5:84b80f8c r4:84b80c00 r7:ddde2d80 r6:83018200 r5:84b80f8c r4:85039300 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:175:3936 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:175 state:D stack:0 pid:3936 tgid:3936 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88d5d84 r8:00000002 r7:60000013 r6:e88d5d8c r5:8505b000 r4:8505b000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8505b000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88d5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502f840 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8505b000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06b9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b8038c r4:84b80000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b8038c r4:85039400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8505b000 r8:8503942c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85039400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85039400 r8:80287e08 r7:e88e5e60 r6:85039480 r5:8505b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88d5fb0 to 0xe88d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8502f6c0 INFO: task kworker/1:175:3936 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cbb29000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/1:176:3939 blocked for more than 455 seconds. r4:8505bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88e9e08 r5:00001000 r4:e06e3000 r5:84b8078c r4:84b80400 r7:ddde2d80 r6:83018200 r5:84b8078c r4:85039500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8505bc00 r8:8503952c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85039500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85039500 r8:80287e08 r7:e88e5e60 r6:85039580 r5:8505bc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88e9fb0 to 0xe88e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8502f640 INFO: task kworker/1:176:3939 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cbfa6000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:177:3942 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:8505c800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 r5:84b80b8c r4:84b80800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85039600 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:178 state:D stack:0 pid:3944 tgid:3944 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88f5d84 r8:00000002 r7:60000113 r6:e88f5d8c r5:8505d400 r4:8505d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8505d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88f5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502fec0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8505d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e075d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b8138c r4:84b81000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b8138c r4:85039700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8505d400 r8:8503972c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85039700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85039700 r8:80287e08 r7:e88e5e60 r6:85039780 r5:8505d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88f5fb0 to 0xe88f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8502fbc0 INFO: task kworker/1:178:3944 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cc3bb000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8505e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88ede08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b81b8c r4:84b81800 r10:61c88647 r9:8505e000 r8:8503982c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:240:3946 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:240 state:D stack:0 pid:3946 tgid:3946 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea909d84 r8:00000002 r7:60000113 r6:ea909d8c r5:8505ec00 r4:8505ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8505ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea909e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850145c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8505ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07a5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f038c r4:850f0000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850f038c r4:8503be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8505ec00 r8:8503beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8503be80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503be80 r8:80287e08 r7:e8891e60 r6:8503bf00 r5:8505ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea909fb0 to 0xea909ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:850324c0 INFO: task kworker/0:240:3946 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ccaae000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Call trace: [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b8178c r4:84b81400 r10:61c88647 r9:850c0c00 r8:8503992c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85016280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:850c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9e5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b8238c r4:84b82000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b8238c r4:85039980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850c2400 r8:850399ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85039980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85039980 r8:80287e08 r7:e88ede60 r6:85006000 r5:850c2400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea919fb0 to 0xea919ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8502fdc0 INFO: task kworker/1:181:3950 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ccaae000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 INFO: task kworker/1:182:3953 blocked for more than 455 seconds. r4:850c3000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea921e08 r9:83018205 r8:850c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f027000 r5:84b81f8c r4:84b81c00 r10:61c88647 r9:850c3000 r8:85039a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85016400 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:850c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa11000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b8278c r4:84b82400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b8278c r4:85039a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850c4800 r8:85039aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85039a80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85039a80 r8:80287e08 r7:ea919e60 r6:85006100 r5:850c4800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4845fb0 to 0xe4845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:850161c0 INFO: task kworker/1:183:3955 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cd454000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:850c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 r5:84b82b8c r4:84b82800 r10:61c88647 r9:850c3c00 r8:85039b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:185:3958 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:185 state:D stack:0 pid:3958 tgid:3958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea929d84 r8:00000002 r7:60000013 r6:ea929d8c r5:850c5400 r4:850c5400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850c5400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea929e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850166c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:850c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfad1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b82f8c r4:84b82c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b82f8c r4:85039b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850c5400 r8:85039bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xea929fb0 to 0xea929ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdffe1fb0 to 0xdffe1ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:850c6c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea931e08 r9:83018205 r8:850c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 r5:84b8338c r4:84b83000 r10:61c88647 r9:850c6c00 r8:85039c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea93de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85016900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:850c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b8378c r4:84b83400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b8378c r4:85039c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850c6000 r8:85039cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85039c80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85039c80 r8:80287e08 r7:ea931e60 r6:85006300 r5:850c6000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea93dfb0 to 0xea93dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85016680 INFO: task kworker/1:187:3965 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cda82000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:188:3966 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:188 state:D stack:0 pid:3966 tgid:3966 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea941d84 r8:00000002 r7:60000013 r6:ea941d8c r5:84a75400 r4:84a75400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a75400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b8d78c r4:84b8d400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b8d78c r4:85039d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a75400 r8:85039d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85039d00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85039d00 r8:80287e08 r7:ea93de60 r6:85006380 r5:84a75400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea941fb0 to 0xea941ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85016680 INFO: task kworker/1:188:3966 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ce4bb000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 task:kworker/1:189 state:D stack:0 pid:3967 tgid:3967 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea945e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b83b8c r4:84b83800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85039d80 Exception stack(0xea945fb0 to 0xea945ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfd49000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:848a9800 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84b83f8c r4:84b83c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85039e00 r8:80287e08 r7:ea941e60 r6:85006480 r5:848a9800 r4:85016700 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:848d9e00 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:191:3971 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:191 state:D stack:0 pid:3971 tgid:3971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea955d84 r8:00000002 r7:60000113 r6:ea955d8c r5:848a8c00 r4:848a8c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848a8c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea955e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85016d40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:848a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0005000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b8c38c r4:84b8c000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b8c38c r4:85039e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848a8c00 r8:85039eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85039e80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85039e80 r8:80287e08 r7:ea941e60 r6:85006500 r5:848a8c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea955fb0 to 0xea955ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85016940 INFO: task kworker/1:191:3971 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ceb39000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:848aa400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea965e08 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:193:3975 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:193 state:D stack:0 pid:3975 tgid:3975 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea96dd84 r8:00000002 r7:60000113 r6:ea96dd8c r5:848ac800 r4:848ac800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848ac800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea96de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85016f80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:848ac800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e006b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b8cb8c r4:84b8c800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b8cb8c r4:85039f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848ac800 r8:85039fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85039f80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85039f80 r8:80287e08 r7:ea941e60 r6:85006600 r5:848ac800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea96dfb0 to 0xea96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85016d00 INFO: task kworker/1:193:3975 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ceb39000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848abc00 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b8cf8c r4:84b8cc00 r10:61c88647 r9:848abc00 r8:8495a02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:195:3979 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:195 state:D stack:0 pid:3979 tgid:3979 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea97dd84 r8:00000002 r7:60000113 r6:ea97dd8c r5:848ab000 r4:848ab000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848ab000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea97de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849622c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:848ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00a9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b8d38c r4:84b8d000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b8d38c r4:8495a080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848ab000 r8:8495a0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8495a080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8495a080 r8:80287e08 r7:ea941e60 r6:85006700 r5:848ab000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea97dfb0 to 0xea97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84962000 INFO: task kworker/1:195:3979 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cf3e5000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:196:3981 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:196 state:D stack:0 pid:3981 tgid:3981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea985d84 r8:00000002 r7:60000113 r6:ea985d8c r5:848ad400 r4:848ad400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848ad400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea985e08 r4:00000000 r5:84b8df8c r4:84b8dc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xea985fb0 to 0xea985ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfd49000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e00e5000 r5:84b8db8c r4:84b8d800 r10:61c88647 r9:85050000 r8:8495a1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8495a180 r8:80287e08 r7:ea985e60 r6:8495a200 r5:85050000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea905fb0 to 0xea905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84962280 INFO: task kworker/1:197:3983 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cf523000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:198:3986 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:198 state:D stack:0 pid:3986 tgid:3986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea989d84 r8:00000002 r7:60000113 r6:ea989d8c r5:85051800 r4:85051800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85051800 r4:8291a680 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b8eb8c r4:84b8e800 r7:ddde2d80 r6:83018200 r5:84b8eb8c r4:8495a280 r10:00000000 r9:8495a280 r8:80287e08 r7:ea985e60 r6:8495a300 r5:85051800 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:199:3988 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:199 state:D stack:0 pid:3988 tgid:3988 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea991d84 r8:00000002 r7:60000113 r6:ea991d8c r5:85053000 r4:85053000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85053000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea991e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84962800 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85053000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e011b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b8e38c r4:84b8e000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b8e38c r4:8495a380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85053000 r8:8495a3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8495a380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8495a380 r8:80287e08 r7:ea989e60 r6:8495a400 r5:85053000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea991fb0 to 0xea991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84962600 INFO: task kworker/1:199:3988 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r5:00001000 r4:dfd49000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:200:3989 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:200 state:D stack:0 pid:3989 tgid:3989 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea98dd84 r8:00000002 r7:60000013 r6:ea98dd8c r5:85053c00 r4:85053c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85053c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea98de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84962a00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85053c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0143000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b8e78c r4:84b8e400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b8e78c r4:8495a480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85053c00 r8:8495a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8495a480 r4:00000001 r4:84962700 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:241:3992 blocked for more than 455 seconds. Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:850f178c r4:850f1400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85054800 r8:8500682c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:00000000 r5:84a3a38c r4:84a3a000 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 task:kworker/1:201 state:D stack:0 pid:3993 tgid:3993 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a1e08 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84962f00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85055400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0539000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b8ef8c r4:84b8ec00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b8ef8c r4:8495a600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85055400 r8:8495a62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8495a600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8495a600 r8:80287e08 r7:ea989e60 r6:8495a680 r5:85055400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9a1fb0 to 0xea9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84962b00 INFO: task kworker/1:201:3993 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d057e000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85056c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a5e08 r5:00001000 r4:e0549000 r5:84b8f38c r4:84b8f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:203:3998 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:203 state:D stack:0 pid:3998 tgid:3998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea995d84 r8:00000002 r7:60000113 r6:ea995d8c r5:85056000 r4:85056000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85056000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea995e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8473a380 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85056000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0577000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b8fb8c r4:84b8f800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b8fb8c r4:8495a800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85056000 r8:8495a82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8495a800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8495a800 r8:80287e08 r7:ea9a5e60 r6:8495a880 r5:85056000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea995fb0 to 0xea995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84962f80 INFO: task kworker/1:203:3998 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d09ed000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:848cab40 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a9e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b8f78c r4:84b8f400 r4:8495a900 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85050c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 r5:84b8ff8c r4:84b8fc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85050c00 r8:8495aa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8495aa00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8495aa00 r8:80287e08 r7:ea995e60 r6:8495aa80 r5:85050c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea90dfb0 to 0xea90dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8473a200 INFO: task kworker/1:205:4003 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d0f86000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:206:4004 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:206 state:D stack:0 pid:4004 tgid:4004 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:85060000 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8513038c r4:85130000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8495ab00 1fa0: 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85060c00 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85060c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4849000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8513078c r4:85130400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513078c r4:8495ac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85060c00 r8:8495ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8495ac00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8495ac00 r8:80287e08 r7:ea9b1e60 r6:8495ac80 r5:85060c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9b5fb0 to 0xea9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8473a500 INFO: task kworker/1:207:4006 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d1305000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85061800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 r5:85130b8c r4:85130800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r4:00000000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85130f8c r4:8495ae00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85062400 r8:8495ae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8495ae00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8495ae00 r8:80287e08 r7:ea9b9e60 r6:8495ae80 r5:85062400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9bdfb0 to 0xea9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8473a780 INFO: task kworker/1:209:4010 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d1bfe000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:848cab40 task:kworker/1:210 state:D stack:0 pid:4012 tgid:4012 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:85131f8c r4:85131c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:848cab40 task:kworker/1:211 state:D stack:0 pid:4014 tgid:4014 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9cde08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8513138c r4:84aa1000 r4:00000001 r4:8473aa40 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:212:4016 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:212 state:D stack:0 pid:4016 tgid:4016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9d1d84 r8:00000002 r7:60000113 r6:ea9d1d8c r5:85064800 r4:85064800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85064800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8473adc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85064800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bf000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8513178c r4:85131400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513178c r4:84aa1100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85064800 r8:84aa112c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aa1100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa1100 r8:80287e08 r7:ea9c9e60 r6:84aa1180 r5:85064800 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ea9df000 r5:85131b8c r4:85131800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:214:4020 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:214 state:D stack:0 pid:4020 tgid:4020 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9e9d84 r8:00000002 r7:60000113 r6:ea9e9d8c r5:85066c00 r4:85066c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85066c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a1540 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85066c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8513278c r4:85132400 r7:ddde2d80 r6:83018200 r5:8513278c r4:84aa1300 r10:00000000 r9:84aa1300 r8:80287e08 r7:ea9c9e60 r6:84aa1380 r5:85066c00 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:85068000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f5e08 r9:83018205 r8:85068000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 r5:8513238c r4:85132000 r10:61c88647 r9:85068000 r8:84aa142c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85066000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a1680 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85066000 r7:00000000 r6:83018200 r5:00001000 r4:7f025000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df97d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85132b8c r4:85132800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85132b8c r4:84aa1500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85066000 r8:84aa152c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aa1500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa1500 r8:80287e08 r7:ea9e9e60 r6:85006880 r5:85066000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa11fb0 to 0xeaa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:847a1640 INFO: task kworker/1:216:4028 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d2c08000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:848aec00 r4:8291a680 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:850f0b8c r4:850f0800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84aa1580 5fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa21d84 r8:00000002 r7:60000113 r6:eaa21d8c r5:850c0000 r4:850c0000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850c0000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa21e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a17c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:850c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb79000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85132f8c r4:85132c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85132f8c r4:84aa1600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850c0000 r8:84aa162c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aa1600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa1600 r8:80287e08 r7:eaa15e60 r6:85006980 r5:850c0000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa21fb0 to 0xeaa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:847a1640 INFO: task kworker/1:218:4031 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d3036000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:850c1800 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8513338c r4:85133000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84aa1680 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r5:84a3a38c r4:84a3a000 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 task:kworker/1:220 state:D stack:0 pid:4033 tgid:4033 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8513378c r4:84aa1700 r10:00000000 r9:84aa1700 r8:80287e08 r7:eaa25e60 r6:85006a80 r5:847b0c00 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d33ce000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:221:4035 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:221 state:D stack:0 pid:4035 tgid:4035 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:847b1800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa2de08 r5:00001000 r4:eac89000 r5:8514ab8c r4:8514a800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84aa1780 dfa0: 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:847b2400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa31e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850f138c r4:850f1000 r10:61c88647 r9:847b2400 r8:84aa182c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aa1800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa1800 r8:80287e08 r7:eaa2de60 r6:85006b80 r5:847b2400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa31fb0 to 0xeaa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:847a1640 INFO: task kworker/1:222:4036 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d398d000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:223:4038 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:223 state:D stack:0 pid:4038 tgid:4038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa39d84 r8:00000002 r7:60000113 r6:eaa39d8c r5:847b3c00 r4:847b3c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847b3c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa39e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a1d80 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85133b8c r4:85133800 r7:ddde2d80 r6:83018200 r5:85133b8c r4:84aa1880 r10:00000000 r9:84aa1880 r8:80287e08 r7:eaa2de60 r6:85006c00 r5:847b3c00 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:242:4041 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:242 state:D stack:0 pid:4041 tgid:4041 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa3dd84 r8:00000002 r7:60000013 r6:eaa3dd8c r5:847b4800 r4:847b4800 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850f1b8c r4:850f1800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:847c9180 INFO: task kworker/0:242:4041 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d3acd000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850f278c r4:850f2400 r7:dddced80 r6:83018000 r5:850f278c r4:85006d80 r10:61c88647 r9:85068c00 r8:85006dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85006d80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006d80 r8:80287e08 r7:e8891e60 r6:84aa1900 r5:85068c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9ddfb0 to 0xea9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:847c9180 INFO: task kworker/0:243:4042 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d3e5d000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d60: 80230ad0 80239bb0 800f0113 ffffffff [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850f238c r4:850f2000 r7:dddced80 r6:83018000 r5:850f238c r4:85006e00 r10:00000000 r9:85006e00 r8:80287e08 r7:ea9dde60 r6:85006e80 r5:847b3000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r5:84a3a38c r4:84a3a000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e05a9000 r5:850f2b8c r4:850f2800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85006f00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006f00 r8:80287e08 r7:ea9dde60 r6:85006f80 r5:847b5400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa45fb0 to 0xeaa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:847c95c0 INFO: task kworker/0:245:4047 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d42d9000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:246:4049 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:246 state:D stack:0 pid:4049 tgid:4049 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa4dd84 r8:00000002 r7:60000113 r6:eaa4dd8c r5:847b0000 r4:847b0000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847b0000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:850f338c r4:850f3000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 r5:84a3a38c r4:84a3a000 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 INFO: task kworker/1:224:4051 blocked for more than 456 seconds. r4:847b6000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa51e08 r5:00001000 r4:e05bf000 r5:85133f8c r4:85133c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85133f8c r4:84aa1980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847b6000 r8:84aa19ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84aa1980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa1980 r8:80287e08 r7:eaa2de60 r6:847ce100 r5:847b6000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa51fb0 to 0xeaa51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:847a1c00 INFO: task kworker/1:224:4051 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d46c9000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 task:kworker/1:225 state:D stack:0 pid:4053 tgid:4053 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:df9c5000 r5:8514878c r4:85148400 r7:ddde2d80 r6:83018200 r5:8514878c r4:84aa1a00 r10:00000000 r9:84aa1a00 r8:80287e08 r7:eaa2de60 r6:847ce180 r5:850e0000 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:247:4054 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:247 state:D stack:0 pid:4054 tgid:4054 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa41d84 r8:00000002 r7:60000013 r6:eaa41d8c r5:85069800 r4:85069800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85069800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:850f2f8c r4:850f2c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85069800 r8:847ce22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847c9900 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:248:4057 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:248 state:D stack:0 pid:4057 tgid:4057 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa61d84 r8:00000002 r7:60000113 r6:eaa61d8c r5:8506bc00 r4:8506bc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8506bc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa61e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:850f378c r4:850f3400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:847ce280 1fa0: 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa69e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c6680 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8506c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07b9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85100b8c r4:85100800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85100b8c r4:847ce300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8506c800 r8:847ce32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ce300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ce300 r8:80287e08 r7:eaa61e60 r6:84aa1b80 r5:8506c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa69fb0 to 0xeaa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849017c0 INFO: task kworker/0:249:4059 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d500e000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa6de08 r5:00001000 r4:e0697000 r5:850f3b8c r4:850f3800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8506e000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06ad000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f3f8c r4:850f3c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850f3f8c r4:847ce400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8506e000 r8:847ce42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ce400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ce400 r8:80287e08 r7:eaa69e60 r6:84aa1c80 r5:8506e000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa75fb0 to 0xeaa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:847c9f00 INFO: task kworker/0:251:4062 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d52c8000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:252:4064 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:252 state:D stack:0 pid:4064 tgid:4064 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa7dd84 r8:00000002 r7:60000113 r6:eaa7dd8c r5:8506a400 r4:8506a400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8506a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa7de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c60c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8506a400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06cd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8472638c r4:84726000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8472638c r4:847ce480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8506a400 r8:847ce4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ce480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ce480 r8:80287e08 r7:eaa69e60 r6:84aa1d00 r5:8506a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa7dfb0 to 0xeaa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:847a1e80 INFO: task kworker/0:252:4064 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d52c8000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:253:4066 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:253 state:D stack:0 pid:4066 tgid:4066 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa85d84 r8:00000002 r7:60000013 r6:eaa85d8c r5:8506ec00 r4:8506ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8506ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa85e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c6000 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8506ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e071d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84725f8c r4:84725c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84725f8c r4:847ce500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8506ec00 r8:847ce52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ce500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ce500 r8:80287e08 r7:eaa69e60 r6:84aa1d80 r5:8506ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa85fb0 to 0xeaa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:847c6000 INFO: task kworker/0:253:4066 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d5758000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:254:4068 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:254 state:D stack:0 pid:4068 tgid:4068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa8dd84 r8:00000002 r7:60000013 r6:eaa8dd8c r5:850d8000 r4:850d8000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850d8000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa8de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c6400 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:850d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0767000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510038c r4:85100000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:255:4070 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:255 state:D stack:0 pid:4070 tgid:4070 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:850d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r5:8510078c r4:85100400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8510078c r4:847ce600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850d9800 r8:847ce62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ce600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ce600 r8:80287e08 r7:eaa69e60 r6:84aa1e80 r5:850d9800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa95fb0 to 0xeaa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:847c6300 INFO: task kworker/0:255:4070 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d5b3d000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:8510178c r4:85101400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:847ce680 Exception stack(0xeaa9dfb0 to 0xeaa9dff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eaaa9d84 r8:00000002 r7:60000013 r6:eaaa9d8c r5:850dbc00 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:258:4076 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:258 state:D stack:0 pid:4076 tgid:4076 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaab1d84 r8:00000002 r7:60000113 r6:eaab1d8c r5:850db000 r4:850db000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850db000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c6900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:850db000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa17000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510138c r4:85101000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8510138c r4:847ce780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850db000 r8:847ce7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ce780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ce780 r8:80287e08 r7:eaa9de60 r6:84ae4000 r5:850db000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r5:00001000 r4:dfd49000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:850da400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 r5:85102f8c r4:85102c00 r10:61c88647 r9:850da400 r8:847ce82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847c6500 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:848cab40 task:kworker/0:260 state:D stack:0 pid:4080 tgid:4080 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85101b8c r4:85101800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85101b8c r4:847ce880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850de000 r8:847ce8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ce880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ce880 r8:80287e08 r7:eaac5e60 r6:84ae4100 r5:850de000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaacdfb0 to 0xeaacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:847c68c0 INFO: task kworker/0:260:4080 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d67e6000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/0:262:4084 blocked for more than 456 seconds. r4:850dc800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf5e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510238c r4:85102000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8510238c r4:847ce980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850dc800 r8:847ce9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ce980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ce980 r8:80287e08 r7:eaac5e60 r6:84ae4200 r5:850dc800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaf5fb0 to 0xeaaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:847c6c80 INFO: task kworker/0:262:4084 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d6d7f000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:263:4086 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:263 state:D stack:0 pid:4086 tgid:4086 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab05d84 r8:00000002 r7:60000113 r6:eab05d8c r5:850dec00 r5:850dec00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c6e00 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:850dec00 r8:847cea2c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:847c6e40 INFO: task kworker/0:263:4086 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d6d7f000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: d7078000 dfcef000 00000001 80239b98 7f0f1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8439f340 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85070c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab25000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510338c r4:85103000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8510338c r4:847ceb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85070c00 r8:847ceb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ceb00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ceb00 r8:80287e08 r7:eaac5e60 r6:84ae4380 r5:85070c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab21fb0 to 0xeab21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:847c6f40 INFO: task kworker/0:265:4090 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d7078000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:267:4094 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:267 state:D stack:0 pid:4094 tgid:4094 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab45d84 r8:00000002 r7:60000013 r6:eab45d8c r5:85071800 r4:85071800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85071800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab45e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8439f5c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85071800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab41000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85103b8c r4:85103800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85103b8c r4:847cec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:847cec00 r8:80287e08 r7:eab31e60 r6:84ae4480 r5:85071800 r4:8439f300 Call trace: 1d20: d742a000 dfcef000 00000001 80239b98 7f0f1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab51fb0 to 0xeab51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8439f1c0 INFO: task kworker/0:268:4096 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d790a000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85073000 r8:847ced2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ced00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ced00 r8:80287e08 r7:eab51e60 r6:84ae4580 r5:85073000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab5dfb0 to 0xeab5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8439f400 INFO: task kworker/0:269:4098 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d790a000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:85073c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab75e08 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510438c r4:85104000 r10:61c88647 r9:85073c00 r8:847cedac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 1d60: 80230ad0 80239bb0 800f0113 ffffffff r4:dffe1dc0 r5:00001000 r4:dfd49000 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:271:4102 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:271 state:D stack:0 pid:4102 tgid:4102 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab7dd84 r8:00000002 r7:60000013 r6:eab7dd8c r5:85074800 r4:85074800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85074800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab7de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8439f940 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85074800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab71000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510478c r4:85104400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8510478c r4:847cee00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85074800 r8:847cee2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847cee00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cee00 r8:80287e08 r7:eab51e60 r6:84ae4680 r5:85074800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) r4:8439f480 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r5:800f0113 r4:80239bb0 r4:dffe1dc0 r5:00001000 r4:dfd49000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:272:4104 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:272 state:D stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab8dd84 r8:00000002 r7:60000113 r6:eab8dd8c r5:85075400 r4:85075400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85075400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab8de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c33c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85075400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa23000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85105f8c r4:85105c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85105f8c r4:847cee80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85075400 r8:847ceeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847cee80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cee80 r8:80287e08 r7:eab51e60 r6:84ae4700 r5:85075400 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/0:273:4106 blocked for more than 456 seconds. r4:85076000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85104f8c r4:85104c00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8439f8c0 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:274:4108 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:274 state:D stack:0 pid:4108 tgid:4108 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabb5d84 r8:00000002 r7:60000113 r6:eabb5d8c r5:85168000 r4:85168000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85168000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8439fcc0 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:275:4110 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:275 state:D stack:0 pid:4110 tgid:4110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabbdd84 r8:00000002 r7:60000113 r6:eabbdd8c r5:85169800 r4:85169800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85169800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabbde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8439fe40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85169800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabb1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510578c r4:85105400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8510578c r4:85004000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85169800 r8:8500402c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85004000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004000 r8:80287e08 r7:eab8de60 r6:84ae4880 r5:85169800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabbdfb0 to 0xeabbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8439fac0 INFO: task kworker/0:275:4110 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:00000000 r5:84a3a38c r4:84a3a000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:df9eb000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeaa55fb0 to 0xeaa55ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) r4:848cab40 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85148b8c r4:84ae4980 r10:00000000 r9:84ae4980 r8:80287e08 r7:eaa2de60 r6:84ae4a00 r5:8516bc00 r4:84967a40 Call trace: 1d20: d93bc000 dfcef000 00000001 80239b98 7f0f1000 00000001 r4:dffe1dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:277:4118 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:277 state:D stack:0 pid:4118 tgid:4118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea92dd84 r8:00000002 r7:60000113 r6:ea92dd8c r5:8516c800 r4:8516c800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8516c800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea92de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84963340 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8516c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb1d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510678c r4:85106400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8510678c r4:85004100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8516c800 r8:8500412c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85004100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004100 r8:80287e08 r7:eab8de60 r6:84ae4a80 r5:8516c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea92dfb0 to 0xea92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:847c36c0 INFO: task kworker/0:277:4118 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d93bc000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:278:4119 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:278 state:D stack:0 pid:4119 tgid:4119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea935d84 r8:00000002 r7:60000113 r6:ea935d8c r5:8516d400 r4:8516d400 r5:8516d400 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510638c r4:85106000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d9a4e000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:279:4121 blocked for more than 456 seconds. r5:8516e000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea951e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8516e000 r8:8500422c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xea951fb0 to 0xea951ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0113 r4:80239bb0 r4:dffe1dc0 r5:00001000 r4:dfd49000 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r4:850e2400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa01e08 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85004280 r8:80287e08 r7:ea951e60 r6:85004300 r5:850e2400 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:281:4126 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:281 state:D stack:0 pid:4126 tgid:4126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea959d84 r8:00000002 r7:60000113 r6:ea959d8c r5:850e3000 r4:850e3000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850e3000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea959e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84963700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:850e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffed000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510738c r4:85107000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8510738c r4:85004380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850e3000 r8:850043ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85004380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004380 r8:80287e08 r7:ea951e60 r6:85004400 r5:850e3000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea959fb0 to 0xea959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84963380 INFO: task kworker/0:281:4126 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d9b7a000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xea9e5fb0 to 0xea9e5ff8) r4:84963500 Call trace: 1d20: d9fa9000 dfcef000 00000001 80239b98 7f0f1000 00000001 r4:dffe1dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:283:4130 blocked for more than 456 seconds. r4:850e5400 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85004580 r8:80287e08 r7:ea9e5e60 r6:85004600 r5:850e5400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d9fa9000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:284:4132 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:284 state:D stack:0 pid:4132 tgid:4132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabb9d84 r8:00000002 r7:60000013 r6:eabb9d8c r5:850e6000 r4:850e6000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850e6000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84963bc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:850e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00a7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85107f8c r4:85107c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85107f8c r4:85004680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850e6000 r8:850046ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85004680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004680 r8:80287e08 r7:ea9f1e60 r6:85004700 r5:850e6000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb9fb0 to 0xeabb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84963b80 INFO: task kworker/0:284:4132 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: da60a000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:848cab40 Workqueue: events bpf_prog_free_deferred r5:850e6c00 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xea9fdfb0 to 0xea9fdff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 Exception stack(0xdffe1d28 to 0xdffe1d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:286:4136 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:286 state:D stack:0 pid:4136 tgid:4136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa09d84 r8:00000002 r7:60000113 r6:eaa09d8c r5:850e4800 r4:850e4800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850e4800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa09e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849630c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:850e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0113000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85110b8c r4:85110800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85110b8c r4:85004880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850e4800 r8:850048ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85004880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004880 r8:80287e08 r7:ea9fde60 r6:85004900 r5:850e4800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa09fb0 to 0xeaa09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84963dc0 INFO: task kworker/0:286:4136 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: daa15000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:850e1800 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e00ed000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:850e1800 r8:850049ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r4:850e0c00 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c31c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:850e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0155000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85110f8c r4:85110c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85110f8c r4:85004a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850e0c00 r8:85004aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85004a80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004a80 r8:80287e08 r7:eaa09e60 r6:85004b00 r5:850e0c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd5fb0 to 0xeabd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:847c36c0 INFO: task kworker/0:288:4141 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: daef6000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:289:4142 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:289 state:D stack:0 pid:4142 tgid:4142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabddd84 r8:00000002 r7:60000013 r6:eabddd8c r5:847b6c00 r4:847b6c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847b6c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabdde08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85004b80 Exception stack(0xeabddfb0 to 0xeabddff8) r4:85015080 Workqueue: events bpf_prog_free_deferred 1d20: db167000 dfcef000 00000001 80239b98 7f0f1000 00000001 r4:dffe1dc0 r5:00001000 r4:dfd49000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:290:4144 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:290 state:D stack:0 pid:4144 tgid:4144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabd9d84 r8:00000002 r7:60000113 r6:eabd9d8c r5:849a8c00 r4:849a8c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849a8c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85015bc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8881000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85112b8c r4:85112800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85112b8c r4:85004c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849a8c00 r8:85004cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85004c80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004c80 r8:80287e08 r7:eabdde60 r6:85004d00 r5:849a8c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd9fb0 to 0xeabd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85015140 INFO: task kworker/0:290:4144 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: db167000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:291:4146 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:291 state:D stack:0 pid:4146 tgid:4146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabe5d84 r8:00000002 r7:60000013 r6:eabe5d8c r5:849a8000 r4:849a8000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849a8000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85015380 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511178c r4:85111400 r10:61c88647 r9:849a8000 r8:85004dac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: db612000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85111b8c r4:85111800 r10:61c88647 r9:849ab000 r8:85004eac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeabe9fb0 to 0xeabe9ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:293:4150 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:293 state:D stack:0 pid:4150 tgid:4150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabedd84 r8:00000002 r7:60000013 r6:eabedd8c r5:849abc00 r4:849abc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849abc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85111f8c r4:85111c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: dbc1e000 dfcef000 00000001 80239b98 7f0f1000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/0:294:4151 blocked for more than 456 seconds. r10:8291a684 r9:eabf1d84 r8:00000002 r7:60000013 r6:eabf1d8c r5:849ac800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85015a80 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:849ac800 r8:850280ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: dbc1e000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:295:4153 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:295 state:D stack:0 pid:4153 tgid:4153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabf5d84 r8:00000002 r7:60000013 r6:eabf5d8c r5:849ad400 r4:849ad400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849ad400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85015c80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07d1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511278c r4:85112400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r5:800f0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:296:4156 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:296 state:D stack:0 pid:4156 tgid:4156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabfdd84 r8:00000002 r7:60000013 r6:eabfdd8c r5:849a9800 r4:849a9800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849a9800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabfde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501b4c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea939000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511338c r4:85113000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8511338c r4:85028300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849a9800 r8:8502832c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85028300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85028300 r8:80287e08 r7:eabd9e60 r6:85028380 r5:849a9800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabfdfb0 to 0xeabfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85015f40 INFO: task kworker/0:296:4156 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 Exception stack(0xdffe1d28 to 0xdffe1d70) r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac01e08 r5:00001000 r4:ea911000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:849aa400 r8:850282ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: dc604000 dfcef000 00000001 80239b98 7f0f1000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r5:00001000 r4:dfd49000 r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac09e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85023040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88f7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85148f8c r4:85148c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85148f8c r4:84ae4c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851a0000 r8:84ae4c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae4c00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae4c00 r8:80287e08 r7:eaa2de60 r6:85028480 r5:851a0000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac09fb0 to 0xeac09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85023000 INFO: task kworker/1:227:4160 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: dc604000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:228:4162 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:228 state:D stack:0 pid:4162 tgid:4162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac0dd84 r8:00000002 r7:60000113 r6:eac0dd8c r5:851a1800 r4:851a1800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851a1800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:851a1800 r8:84ae4cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:298:4164 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:298 state:D stack:0 pid:4164 tgid:4164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac05d84 r8:00000002 r7:60000113 r6:eac05d8c r5:851a2400 r4:851a2400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851a2400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac05e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511378c r4:85113400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8511378c r4:85028580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851a2400 r8:850285ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85028580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85028580 r8:80287e08 r7:eabfde60 r6:85028600 r5:851a2400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac05fb0 to 0xeac05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8501b540 INFO: task kworker/0:298:4164 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: dd19a000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r4:00000000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xdffe1fb0 to 0xdffe1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred r4:851a3000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85113b8c r4:85113800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:851a3000 r8:850286ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeabe1fb0 to 0xeabe1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred r4:00000000 1d20: dd19a000 dfcef000 00000001 80239b98 7f0f1000 00000001 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:300:4168 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:300 state:D stack:0 pid:4168 tgid:4168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabf9d84 r8:00000002 r7:60000113 r6:eabf9d8c r5:851a3c00 r4:851a3c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851a3c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501b900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea981000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85113f8c r4:85113c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85113f8c r4:85028780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851a3c00 r8:850287ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85028780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85028780 r8:80287e08 r7:eabe1e60 r6:85028800 r5:851a3c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf9fb0 to 0xeabf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8501b400 INFO: task kworker/0:300:4168 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: dd670000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:301:4170 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:301 state:D stack:0 pid:4170 tgid:4170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac11d84 r8:00000002 r7:60000113 r6:eac11d8c r5:851a4800 r4:851a4800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851a4800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac11e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501ba80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9e1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511838c r4:85118000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8511838c r4:85028880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851a4800 r8:850288ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85028880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85028880 r8:80287e08 r7:eabf9e60 r6:85028900 r5:851a4800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac11fb0 to 0xeac11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8501b780 INFO: task kworker/0:301:4170 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: dd670000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:302:4172 blocked for more than 457 seconds. r5:851a5400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501bdc0 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:851a5400 r8:850289ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85028980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85028980 r8:80287e08 r7:eac11e60 r6:85028a00 r5:851a5400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac15fb0 to 0xeac15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8501b880 INFO: task kworker/0:302:4172 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ddd6d000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r4:848cab40 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:851a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 r5:8511878c r4:85118400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85028a80 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:304 state:D stack:0 pid:4176 tgid:4176 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r9:83018005 r8:851a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 r5:8511978c r4:85119400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8511978c r4:85028b80 r10:61c88647 r9:851a6c00 r8:85028bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85028b80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85028b80 r8:80287e08 r7:eac15e60 r6:85028c00 r5:851a6c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac25fb0 to 0xeac25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8501bc40 INFO: task kworker/0:304:4176 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ddd6d000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:305:4178 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:305 state:D stack:0 pid:4178 tgid:4178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac41d84 r8:00000002 r7:60000013 r6:eac41d8c r5:8516b000 r4:8516b000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8516b000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac41e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501bf00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8516b000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac2d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85118f8c r4:85118c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85118f8c r4:85028c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8516b000 r8:85028cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85028c80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85028c80 r8:80287e08 r7:eac25e60 r6:84ae4d00 r5:8516b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac41fb0 to 0xeac41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8501be40 INFO: task kworker/0:305:4178 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ddd6d000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:306:4180 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:306 state:D stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac59d84 r8:00000002 r7:60000113 r6:eac59d8c r5:85168c00 r4:85168c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85168c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac59e08 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:8511938c r4:85119000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8511938c r4:85028d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85168c00 r8:85028d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85028d00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85028d00 r8:80287e08 r7:eac25e60 r6:84ae4d80 r5:85168c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac59fb0 to 0xeac59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85078080 INFO: task kworker/0:306:4180 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: de3c5000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r5:84a3a38c r4:84a3a000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:8516ec00 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8511a38c r4:8511a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8511a38c r4:85028d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8516ec00 r8:85028dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85028d80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85028d80 r8:80287e08 r7:eac25e60 r6:84ae4e00 r5:8516ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac69fb0 to 0xeac69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85078200 INFO: task kworker/0:307:4182 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: dea68000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r5:00001000 r4:dfd49000 r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:308:4183 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:308 state:D stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac31d84 r8:00000002 r7:60000113 r6:eac31d8c r5:851a0c00 r4:851a0c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851a0c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac31e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85119b8c r4:85119800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85028e00 Exception stack(0xeac31fb0 to 0xeac31ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r4:848d9e00 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 task:kworker/0:309 state:D stack:0 pid:4185 tgid:4185 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:849aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 r5:00001000 r4:eac65000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85119f8c r4:85119c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85119f8c r4:85028f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849aec00 r8:85028f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85028f00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85028f00 r8:80287e08 r7:eac69e60 r6:85028f80 r5:849aec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac3dfb0 to 0xeac3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85078140 INFO: task kworker/0:309:4185 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: dea68000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:310:4188 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:310 state:D stack:0 pid:4188 tgid:4188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac5dd84 r8:00000002 r7:60000113 r6:eac5dd8c r5:849ae000 r4:849ae000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849ae000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac5de08 r4:00000000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8511af8c r4:8511ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8511af8c r4:8503f000 r10:61c88647 r9:849ae000 r8:8503f02c r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:311:4189 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:311 state:D stack:0 pid:4189 tgid:4189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac85d84 r8:00000002 r7:60000013 r6:eac85d8c r5:851b0c00 r4:851b0c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851b0c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac85e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85078740 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:00001000 r4:eac81000 r5:8511a78c r4:8511a400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8511a78c r4:8503f100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b0c00 r8:8503f12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8503f100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503f100 r8:80287e08 r7:eac5de60 r6:8503f180 r5:851b0c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac85fb0 to 0xeac85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:850785c0 INFO: task kworker/0:311:4189 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: df029000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r4:dffe1dc0 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r4:848d9e00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:851b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 r5:8511ab8c r4:8511a800 r10:61c88647 r9:851b1800 r8:8503f22c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:00000000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:229 state:D stack:0 pid:4194 tgid:4194 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85023f80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacad000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514978c r4:85149400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514978c r4:84ae4e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b2400 r8:84ae4eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae4e80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae4e80 r8:80287e08 r7:eaa2de60 r6:8503f300 r5:851b2400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb1fb0 to 0xeacb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85023cc0 INFO: task kworker/1:229:4194 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: df334000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/0:313:4195 blocked for more than 457 seconds. [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8511b38c r4:8503f380 r10:61c88647 r9:851b3c00 r8:8503f3ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeacb5fb0 to 0xeacb5ff8) r4:85078ac0 Workqueue: events bpf_prog_free_deferred r4:00000000 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:314:4198 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:314 state:D stack:0 pid:4198 tgid:4198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e073dd84 r8:00000002 r7:60000113 r6:e073dd8c r5:851b0000 r4:851b0000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851b0000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e073de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507c040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511b78c r4:8511b400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8511b78c r4:8503f480 r4:8503f480 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:e0755d84 r8:00000002 r7:60000113 r6:e0755d8c r5:851b3000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8511bb8c r4:8511b800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8511bb8c r4:8503f580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b3000 r8:8503f5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8503f580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503f580 r8:80287e08 r7:e073de60 r6:8503f600 r5:851b3000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0755fb0 to 0xe0755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8507c080 INFO: task kworker/0:315:4202 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: df774000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:316:4205 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:316 state:D stack:0 pid:4205 tgid:4205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:851b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 r5:8512438c r4:85124000 r10:61c88647 r9:851b5400 r8:8503f6ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507c440 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc69000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511bf8c r4:8511bc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8511bf8c r4:8503f780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b6000 r8:8503f7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8503f780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503f780 r8:80287e08 r7:eac6de60 r6:8503f800 r5:851b6000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca5fb0 to 0xeaca5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8507c2c0 INFO: task kworker/0:317:4206 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: dfc27000 dfcef000 00000001 80239b98 7f0f1000 00000001 1d40: 82ac15a0 7f0f1000 dfcef000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446a880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a3a38c r4:84a3a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3a38c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:318:4207 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:318 state:D stack:0 pid:4207 tgid:4207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaad9d84 r8:00000002 r7:60000113 r6:eaad9d8c r5:851b6c00 r4:851b6c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851b6c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507c840 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd61000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512478c r4:85124400 r10:61c88647 r9:851b6c00 r8:8503f8ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeaad9fb0 to 0xeaad9ff8) r4:8507c2c0 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r4:00000000 r5:84a3a38c r4:84a3a000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:851b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 r5:85149f8c r4:85149c00 r7:ddde2d80 r6:83018200 r5:85149f8c r4:84ae4f00 r4:84ae4f00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae4f00 r8:80287e08 r7:eaa2de60 r6:8503f980 r5:851b4800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaab9fb0 to 0xeaab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85023940 INFO: task kworker/1:230:4209 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 7f53b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:319:4211 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:319 state:D stack:0 pid:4211 tgid:4211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaaddd84 r8:00000002 r7:60000013 r6:eaaddd8c r5:851b8000 r4:851b8000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851b8000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaadde08 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8512538c r4:85125000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:851b8000 r8:8503fa2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeaaddfb0 to 0xeaaddff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 90070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r5:85d2778c r4:85d27400 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 task:kworker/0:320 state:D stack:0 pid:4213 tgid:4213 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507c9c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe89000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85124b8c r4:85124800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85124b8c r4:8503fb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b8c00 r8:8503fb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8503fb00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503fb00 r8:80287e08 r7:eaadde60 r6:8503fb80 r5:851b8c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae9fb0 to 0xeaae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8507c7c0 INFO: task kworker/0:320:4213 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 7f653000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 INFO: task kworker/0:321:4215 blocked for more than 457 seconds. r10:8291a684 r9:eaaf9d84 r8:00000002 r7:60000113 r6:eaaf9d8c r5:851b9800 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:dff41000 r5:85124f8c r4:85124c00 r10:61c88647 r9:851b9800 r8:8503fc2c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 1d60: 80230ad0 80239bb0 90070013 ffffffff r4:dffe1dc0 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:322:4217 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:322 state:D stack:0 pid:4217 tgid:4217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab19d84 r8:00000002 r7:60000113 r6:eab19d8c r5:851ba400 r4:851ba400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851ba400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab19e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507ce40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0183000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512578c r4:85125400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8512578c r4:8503fd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851ba400 r8:8503fd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8503fd00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503fd00 r8:80287e08 r7:eaadde60 r6:8503fd80 r5:851ba400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab19fb0 to 0xeab19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8507cb40 INFO: task kworker/0:322:4217 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r4:00000000 r5:85d2778c r4:85d27400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:323 state:D stack:0 pid:4219 tgid:4219 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85015f40 r5:8512638c r4:85126000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:851bb000 r8:8503fe2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8503fe00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503fe00 r8:80287e08 r7:eab19e60 r6:8503fe80 r5:851bb000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab1dfb0 to 0xeab1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8507cc40 INFO: task kworker/0:323:4219 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 7fc03000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:851bbc00 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85125b8c r4:85125800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8503ff00 r8:80287e08 r7:eab1de60 r6:8503ff80 r5:851bbc00 r4:850789c0 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 1d60: 80230ad0 80239bb0 90070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 INFO: task kworker/0:325:4222 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:325 state:D stack:0 pid:4222 tgid:4222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab39d84 r8:00000002 r7:60000113 r6:eab39d8c r5:851bc800 r4:851bc800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851bc800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab39e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85078980 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05cd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85125f8c r4:85125c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85125f8c r4:85097000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851bc800 r8:8509702c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85097000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097000 r8:80287e08 r7:eab1de60 r6:85097080 r5:851bc800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab39fb0 to 0xeab39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8507cfc0 INFO: task kworker/0:325:4222 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 8002c000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:326 state:D stack:0 pid:4225 tgid:4225 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab49e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8512678c r4:85126400 r10:61c88647 r9:851be000 r8:8509712c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85097100 r8:80287e08 r7:eab1de60 r6:85097180 r5:851be000 r4:8457af80 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:327:4226 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:327 state:D stack:0 pid:4226 tgid:4226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab69d84 r8:00000002 r7:60000013 r6:eab69d8c r5:84908000 r4:84908000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84908000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab69e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85095600 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84908000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06e5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85126b8c r4:85126800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85126b8c r4:85097200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84908000 r8:8509722c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85097200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097200 r8:80287e08 r7:eab49e60 r6:85097280 r5:84908000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab69fb0 to 0xeab69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred 1d20: 80373000 ed6eb000 00000001 80239b98 7f047000 00000001 r4:dffe1dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:231 state:D stack:0 pid:4229 tgid:4229 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab99e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8514a78c r4:8514a400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514a78c r4:84ae4f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84909800 r8:84ae4fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae4f80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae4f80 r8:80287e08 r7:eaa2de60 r6:85097300 r5:84909800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab99fb0 to 0xeab99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8509a080 INFO: task kworker/1:231:4229 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 80373000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:328 state:D stack:0 pid:4231 tgid:4231 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:85126f8c r4:85126c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84908c00 r8:850973ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/0:329:4233 blocked for more than 457 seconds. Call trace: [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8490b000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r5:8512738c r4:85127000 r7:dddced80 r6:83018000 r5:8512738c r4:85097480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8490b000 r8:850974ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85097480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097480 r8:80287e08 r7:eab9de60 r6:85097500 r5:8490b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab59fb0 to 0xeab59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85095680 INFO: task kworker/0:329:4233 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 8078a000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:330:4236 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:330 state:D stack:0 pid:4236 tgid:4236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab3dd84 r8:00000002 r7:60000113 r6:eab3dd8c r5:8490bc00 r4:8490bc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8490bc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab3de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85095a80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8490bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0779000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512778c r4:85127400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8512778c r4:85097580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8490bc00 r8:850975ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85097580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097580 r8:80287e08 r7:eab59e60 r6:85097600 r5:8490bc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab3dfb0 to 0xeab3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:850957c0 INFO: task kworker/0:330:4236 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 80a8f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 INFO: task kworker/0:331:4237 blocked for more than 457 seconds. task:kworker/0:331 state:D stack:0 pid:4237 tgid:4237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaba9d84 r8:00000002 r7:60000013 r6:eaba9d8c r5:8490c800 r4:8490c800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8490c800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85095c40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8490c800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07db000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85127b8c r4:85127800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85127b8c r4:85097680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8490c800 r8:850976ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85097680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097680 r8:80287e08 r7:eab3de60 r6:85097700 r5:8490c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba9fb0 to 0xeaba9ff8) r4:85095900 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 80a8f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 r4:848d9e00 r4:00000001 r4:848cab40 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8490d400 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eaa0b000 r5:851e038c r4:851e0000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8490d400 r8:850977ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85095ac0 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:dffe1dc0 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eacd1d84 r8:00000002 r7:60000013 r6:eacd1d8c r5:8490e000 r5:8490e000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85095d80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8490e000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88a9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85127f8c r4:85127c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85127f8c r4:85097880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8490e000 r8:850978ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85097880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097880 r8:80287e08 r7:eaccde60 r6:85097900 r5:8490e000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd1fb0 to 0xeacd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85095c00 INFO: task kworker/0:333:4241 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 80e38000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85170c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 r5:851e078c r4:851e0400 r7:dddced80 r6:83018000 r5:851e078c r4:85097980 r4:85097980 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85095d00 INFO: task kworker/0:334:4243 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 80e38000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:335:4246 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:335 state:D stack:0 pid:4246 tgid:4246 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eace9d84 r8:00000002 r7:60000013 r6:eace9d8c r5:85173000 r4:85173000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85173000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509f280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85173000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa63000 r5:851e0b8c r4:851e0800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85173000 r8:85097a2c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:dffe1dc0 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:336:4247 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:336 state:D stack:0 pid:4247 tgid:4247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacedd84 r8:00000002 r7:60000013 r6:eacedd8c r5:85175400 r4:85175400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85175400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacede08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509fac0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85175400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaacf000 r5:851e238c r4:851e2000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851e238c r4:85097a80 r10:61c88647 r9:85175400 r8:85097aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8509f100 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 81546000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:337:4248 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:337 state:D stack:0 pid:4248 tgid:4248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacf1d84 r8:00000002 r7:60000113 r6:eacf1d8c r5:85173c00 r4:85173c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85173c00 r4:8291a680 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85173c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r5:851e0f8c r4:851e0c00 r7:dddced80 r6:83018000 r5:851e0f8c r4:85097b00 r10:00000000 r9:85097b00 r8:80287e08 r7:eacede60 r6:850a5180 r5:85173c00 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r5:85d2778c r4:85d27400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:848cab40 Not tainted 6.15.0-rc5-syzkaller #0 r4:85174800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf9e08 r9:83018005 r8:85174800 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 r5:851e138c r4:851e1000 r7:dddced80 r6:83018000 r5:851e138c r4:85097b80 r4:85097b80 Exception stack(0xeacf9fb0 to 0xeacf9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8509f200 INFO: task kworker/0:338:4250 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 81f38000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:339:4252 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:339 state:D stack:0 pid:4252 tgid:4252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead01d84 r8:00000002 r7:60000113 r6:ead01d8c r5:85172400 r4:85172400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85172400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:851e178c r4:851e1400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851e178c r4:85097c00 r4:85097c00 Exception stack(0xead01fb0 to 0xead01ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:dffe1dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 task:kworker/0:340 state:D stack:0 pid:4254 tgid:4254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead09d84 r8:00000002 r7:60000013 r6:ead09d8c r5:85176c00 r4:85176c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85176c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead09e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509f840 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85176c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaab000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851e1b8c r4:851e1800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851e1b8c r4:85097c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85176c00 r8:85097cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85097c80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097c80 r8:80287e08 r7:eacede60 r6:850a5300 r5:85176c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead09fb0 to 0xead09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8509f580 INFO: task kworker/0:340:4254 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 820de000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 task:kworker/0:341 state:D stack:0 pid:4256 tgid:4256 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaabd000 r5:851e1f8c r4:851e1c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851e1f8c r4:85097d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8490ec00 r8:85097d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85097d00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097d00 r8:80287e08 r7:eacede60 r6:85097d80 r5:8490ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd5fb0 to 0xeacd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8509f6c0 INFO: task kworker/0:341:4256 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 820de000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 task:kworker/0:342 state:D stack:0 pid:4259 tgid:4259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead11d84 r8:00000002 r7:60000013 r6:ead11d8c r5:8490a400 r4:8490a400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8490a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead11e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509fc00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8490a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaeb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851e278c r4:851e2400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851e278c r4:85097e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8490a400 r8:85097e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85097e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097e00 r8:80287e08 r7:eacede60 r6:85097e80 r5:8490a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead11fb0 to 0xead11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 INFO: task kworker/0:343:4261 blocked for more than 457 seconds. r10:8291a684 r9:ead15d84 r8:00000002 r7:60000113 r6:ead15d8c r5:851bec00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509fd40 r5:851e2b8c r4:851e2800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85097f00 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: 82666000 ed6eb000 00000001 80239b98 7f047000 00000001 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:344:4263 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:344 state:D stack:0 pid:4263 tgid:4263 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead19d84 r8:00000002 r7:60000113 r6:ead19d8c r5:851bd400 r4:851bd400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851bd400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead19e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:851bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 r5:851e2f8c r4:851e2c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850b7000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:00000000 r5:85d2778c r4:85d27400 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:345 state:D stack:0 pid:4265 tgid:4265 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead1de08 r9:83018005 r8:84810000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 r5:851e338c r4:851e3000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851e338c r4:850b7100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84810000 r8:850b712c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b7100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b7100 r8:80287e08 r7:ead19e60 r6:850b7180 r5:84810000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead1dfb0 to 0xead1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8509fd80 INFO: task kworker/0:345:4265 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 82666000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:346:4267 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:346 state:D stack:0 pid:4267 tgid:4267 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead21d84 r8:00000002 r7:60000113 r6:ead21d8c r5:84810c00 r4:84810c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84810c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead21e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85218380 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84810c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab61000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851e3b8c r4:851e3800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851e3b8c r4:850b7200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84810c00 r8:850b722c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b7200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b7200 r8:80287e08 r7:ead1de60 r6:850b7280 r5:84810c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead21fb0 to 0xead21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85218000 INFO: task kworker/0:346:4267 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 82abc000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 INFO: task kworker/0:347:4268 blocked for more than 457 seconds. r10:8291a684 r9:eacd9d84 r8:00000002 r7:60000113 r6:eacd9d8c r5:84811800 r4:84811800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84811800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85218040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84811800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab4b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851e378c r4:851e3400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851e378c r4:850b7300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84811800 r8:850b732c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b7300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b7300 r8:80287e08 r7:ead21e60 r6:850b7380 r5:84811800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd9fb0 to 0xeacd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85218000 INFO: task kworker/0:347:4268 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 82d95000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:00000000 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r5:85d2778c r4:85d27400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:348:4271 blocked for more than 457 seconds. task:kworker/0:348 state:D stack:0 pid:4271 tgid:4271 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84812400 r5:84812400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead25e08 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85218500 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84812400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab6f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851e3f8c r4:851e3c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851e3f8c r4:850b7400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84812400 r8:850b742c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b7400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b7400 r8:80287e08 r7:ead21e60 r6:850b7480 r5:84812400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead25fb0 to 0xead25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85218200 INFO: task kworker/0:348:4271 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 8325b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:349:4273 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:349 state:D stack:0 pid:4273 tgid:4273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead2dd84 r8:00000002 r7:60000113 r6:ead2dd8c r5:84813000 r4:84813000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84813000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead2de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:84813000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 r5:851e878c r4:851e8400 r10:61c88647 r9:84813000 r8:850b752c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r4:dffe1dc0 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 task:kworker/0:350 state:D stack:0 pid:4275 tgid:4275 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead31d84 r8:00000002 r7:60000113 r6:ead31d8c r5:84813c00 r4:84813c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84813c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead31e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852186c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84813c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab81000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851e838c r4:851e8000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851e838c r4:850b7600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84813c00 r8:850b762c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b7600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b7600 r8:80287e08 r7:ead2de60 r6:850b7680 r5:84813c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead31fb0 to 0xead31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85218540 INFO: task kworker/0:350:4275 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 8348c000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:351 state:D stack:0 pid:4277 tgid:4277 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851e8b8c r4:851e8800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851e8b8c r4:850b7700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84814800 r8:850b772c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b7700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b7700 r8:80287e08 r7:ead2de60 r6:850b7780 r5:84814800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead35fb0 to 0xead35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852185c0 INFO: task kworker/0:351:4277 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 83706000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:352:4279 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:352 state:D stack:0 pid:4279 tgid:4279 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead39d84 r8:00000002 r7:60000013 r6:ead39d8c r5:84815400 r4:84815400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84815400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851e8f8c r4:851e8c00 r7:dddced80 r6:83018000 r5:851e8f8c r4:850b7800 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d20: 83706000 ed6eb000 00000001 80239b98 7f047000 00000001 r4:dffe1dc0 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:353:4281 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:353 state:D stack:0 pid:4281 tgid:4281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead3dd84 r8:00000002 r7:60000113 r6:ead3dd8c r5:84816000 r4:84816000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84816000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead3de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85218c80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84816000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:851e938c r4:851e9000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851e938c r4:850b7900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84816000 r8:850b792c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b7900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b7900 r8:80287e08 r7:ead39e60 r6:850b7980 r5:84816000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead3dfb0 to 0xead3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852189c0 INFO: task kworker/0:353:4281 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 83aae000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:354:4284 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:354 state:D stack:0 pid:4284 tgid:4284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead41d84 r8:00000002 r7:60000113 r6:ead41d8c r5:84816c00 r4:84816c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84816c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead41e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85218dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:851e978c r4:851e9400 r7:dddced80 r6:83018000 r5:851e978c r4:850b7a00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:ead49d84 r8:00000002 r7:60000113 r6:ead49d8c r5:851c8000 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522a040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead63000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851e9f8c r4:851e9c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851e9f8c r4:850b7b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851c8000 r8:850b7b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b7b00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b7b00 r8:80287e08 r7:ead41e60 r6:850b7b80 r5:851c8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead49fb0 to 0xead49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85218c40 INFO: task kworker/0:355:4285 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 83cad000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/0:356:4286 blocked for more than 458 seconds. r10:8291a684 r9:ead55d84 r8:00000002 r7:60000113 r6:ead55d8c r5:851c8c00 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:851e9b8c r4:850b7c00 r10:00000000 r9:850b7c00 r8:80287e08 r7:ead49e60 r6:850b7c80 r5:851c8c00 r4:85218ec0 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:357:4289 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:357 state:D stack:0 pid:4289 tgid:4289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead61d84 r8:00000002 r7:60000113 r6:ead61d8c r5:851c9800 r4:851c9800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c9800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead61e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:851ea38c r4:851ea000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850b7d00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 Not tainted 6.15.0-rc5-syzkaller #0 r5:851ca400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522a600 r5:851eab8c r4:851ea800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8522a180 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 1d20: 845ef000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:359:4292 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:359 state:D stack:0 pid:4292 tgid:4292 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead79d84 r8:00000002 r7:60000013 r6:ead79d8c r5:851cb000 r4:851cb000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851cb000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead79e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522a480 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9d1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851ea78c r4:851ea400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851ea78c r4:850b7f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851cb000 r8:850b7f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850b7f00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b7f00 r8:80287e08 r7:ead6de60 r6:850b7f80 r5:851cb000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead79fb0 to 0xead79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8522a3c0 INFO: task kworker/0:359:4292 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:360:4295 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:360 state:D stack:0 pid:4295 tgid:4295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac4dd84 r8:00000002 r7:60000113 r6:eac4dd8c r5:851cbc00 r4:851cbc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851cbc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac4de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522a780 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851cbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851eaf8c r4:851eac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851eaf8c r4:85230000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851cbc00 r8:8523002c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85230000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85230000 r8:80287e08 r7:ead6de60 r6:85230080 r5:851cbc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac4dfb0 to 0xeac4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8522a400 INFO: task kworker/0:360:4295 is blocked on a mutex likely owned by task kworker/0:115:3602. Workqueue: events bpf_prog_free_deferred 1d20: 847c4000 ed6eb000 00000001 80239b98 7f047000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:361:4298 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:361 state:D stack:0 pid:4298 tgid:4298 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac79d84 r8:00000002 r7:60000113 r6:eac79d8c r5:851cc800 r4:851cc800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851eb38c r4:851eb000 r7:dddced80 r6:83018000 r5:851eb38c r4:85230100 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/0:362:4299 blocked for more than 458 seconds. r4:85171800 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85171800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfefd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851ebb8c r4:851eb800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851ebb8c r4:85230200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85171800 r8:8523022c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85230200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85230200 r8:80287e08 r7:eac79e60 r6:850a5380 r5:85171800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead85fb0 to 0xead85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8522a740 INFO: task kworker/0:362:4299 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 84c7b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851eb78c r4:851eb400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851eb78c r4:85230280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8506d400 r8:852302ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85230280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85230280 r8:80287e08 r7:ead85e60 r6:850a5400 r5:8506d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead95fb0 to 0xead95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8522a740 INFO: task kworker/0:363:4301 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 84c7b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:85176000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85176000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead99e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522ad40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85176000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e001d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851ebf8c r4:851ebc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851ebf8c r4:85230300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85176000 r8:8523032c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85230300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85230300 r8:80287e08 r7:ead85e60 r6:850a5480 r5:85176000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 Workqueue: events bpf_prog_free_deferred r5:85170000 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:851f578c r4:85230380 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:00000000 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:366 state:D stack:0 pid:4306 tgid:4306 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:851f438c r4:851f4000 r4:85230400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85230400 r8:80287e08 r7:eada1e60 r6:850a5580 r5:85178c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeada9fb0 to 0xeada9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8522ab80 INFO: task kworker/0:366:4306 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 85439000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:367:4308 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:367 state:D stack:0 pid:4308 tgid:4308 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadb1d84 r8:00000002 r7:60000013 r6:eadb1d8c r5:85178000 r4:85178000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85178000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522af80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85178000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00b7000 r5:851f478c r4:851f4400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r4:8522acc0 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:00000000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:368:4310 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:368 state:D stack:0 pid:4310 tgid:4310 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadb9d84 r8:00000002 r7:60000113 r6:eadb9d8c r5:85179800 r4:85179800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85179800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8457a580 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85179800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00e7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f4b8c r4:851f4800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f4b8c r4:85230500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85179800 r8:8523052c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85230500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85230500 r8:80287e08 r7:eada1e60 r6:850a5680 r5:85179800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadb9fb0 to 0xeadb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:851f4f8c r4:851f4c00 r10:00000000 r9:85230580 r8:80287e08 r7:eada1e60 r6:85230600 r5:851cd400 Workqueue: events bpf_prog_free_deferred [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:370:4314 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:370 state:D stack:0 pid:4314 tgid:4314 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadbdd84 r8:00000002 r7:60000113 r6:eadbdd8c r5:851ce000 r4:851ce000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851ce000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadbde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85244300 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04c3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f538c r4:851f5000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f538c r4:85230680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851ce000 r8:852306ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85230680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85230680 r8:80287e08 r7:eada1e60 r6:85230700 r5:851ce000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadbdfb0 to 0xeadbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85244240 INFO: task kworker/0:370:4314 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 859bd000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:848cab40 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:851cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 r5:851f638c r4:851f6000 r10:61c88647 r9:851cec00 r8:852307ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:372:4318 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:372 state:D stack:0 pid:4318 tgid:4318 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadc9d84 r8:00000002 r7:60000113 r6:eadc9d8c r5:85258000 r4:85258000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85258000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r4:00000000 r5:851f5b8c r4:851f5800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85258000 r8:852308ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeadc9fb0 to 0xeadc9ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 INFO: task kworker/0:373:4321 blocked for more than 458 seconds. r5:85258c00 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:851f5f8c r4:851f5c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:dffe1dc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:374:4323 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:374 state:D stack:0 pid:4323 tgid:4323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadd1d84 r8:00000002 r7:60000113 r6:eadd1d8c r5:85259800 r4:85259800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85259800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85244a40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85259800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4863000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f678c r4:851f6400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f678c r4:85230a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85259800 r8:85230aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85230a80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85230a80 r8:80287e08 r7:eadc1e60 r6:85230b00 r5:85259800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd1fb0 to 0xeadd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85244700 INFO: task kworker/0:374:4323 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:dffe1dc0 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:375 state:D stack:0 pid:4325 tgid:4325 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadd5d84 r8:00000002 r7:60000113 r6:eadd5d8c r5:8525a400 r4:8525a400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8525a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85244c00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8525a400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8889000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f6b8c r4:851f6800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f6b8c r4:85230b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8525a400 r8:85230bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85230b80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85230b80 r8:80287e08 r7:eadd1e60 r6:85230c00 r5:8525a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd5fb0 to 0xeadd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85244700 INFO: task kworker/0:375:4325 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r4:00000000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:376:4327 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:376 state:D stack:0 pid:4327 tgid:4327 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadd9d84 r8:00000002 r7:60000113 r6:eadd9d8c r5:8525b000 r4:8525b000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8525b000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 r5:851f738c r4:851f7000 r7:dddced80 r6:83018000 r5:851f738c r4:85230c80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 INFO: task kworker/0:377:4328 blocked for more than 458 seconds. r4:8525bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead29e08 r9:83018005 r8:8525bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r5:851f6f8c r4:851f6c00 r10:61c88647 r9:8525bc00 r8:85230dac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/0:378:4331 blocked for more than 458 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eade1d84 r8:00000002 r7:60000013 r6:eade1d8c r5:8525d400 r4:8525d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8525d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85290040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8525d400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea97f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f7b8c r4:851f7800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f7b8c r4:85230e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8525d400 r8:85230eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85230e80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85230e80 r8:80287e08 r7:eadd9e60 r6:85230f00 r5:8525d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeade1fb0 to 0xeade1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85244d80 INFO: task kworker/0:378:4331 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 86ead000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdffe1fb0 to 0xdffe1ff8) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eade5d84 r8:00000002 r7:60000113 r6:eade5d8c r5:8517b000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85218f00 r5:851f778c r4:851f7400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85244d80 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r4:00000000 r5:85d2778c r4:85d27400 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 INFO: task kworker/0:380:4335 blocked for more than 458 seconds. r10:8291a684 r9:eadf1d84 r8:00000002 r7:60000113 r6:eadf1d8c r5:8517d400 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f7f8c r4:851f7c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f7f8c r4:85293000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8517d400 r8:8529302c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85293000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85293000 r8:80287e08 r7:eade1e60 r6:850a5780 r5:8517d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadf1fb0 to 0xeadf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85290080 INFO: task kworker/0:380:4335 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 8714a000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8517bc00 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8517bc00 r8:852930ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:00000000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 INFO: task kworker/0:382:4338 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:382 state:D stack:0 pid:4338 tgid:4338 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadddd84 r8:00000002 r7:60000113 r6:eadddd8c r5:8517e000 r4:8517e000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8517e000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaddde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85290740 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8517e000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac63000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f8b8c r4:851f8800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f8b8c r4:85293100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8517e000 r8:8529312c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85293100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85293100 r8:80287e08 r7:eadf5e60 r6:850a5880 r5:8517e000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadddfb0 to 0xeadddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85290280 INFO: task kworker/0:382:4338 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 874e4000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:232:4341 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:232 state:D stack:0 pid:4341 tgid:4341 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadedd84 r8:00000002 r7:60000113 r6:eadedd8c r5:8517ec00 r4:8517ec00 r5:8517ec00 r4:8291a680 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:851f9b8c r4:851f9800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8517ec00 r8:850a592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeadedfb0 to 0xeadedff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 Not tainted 6.15.0-rc5-syzkaller #0 Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadfdd84 r8:00000002 r7:60000113 r6:eadfdd8c r5:8517a400 r4:8517a400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8517a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadfde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85290640 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8517a400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac51000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f878c r4:851f8400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f878c r4:85293180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8517a400 r8:852931ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85293180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85293180 r8:80287e08 r7:eaddde60 r6:850a5a00 r5:8517a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadfdfb0 to 0xeadfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85290280 INFO: task kworker/0:383:4343 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 87825000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:384 state:D stack:0 pid:4346 tgid:4346 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:851f978c r4:851f9400 r7:dddced80 r6:83018000 r5:851f978c r4:85293200 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:dffe1dc0 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:385:4347 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:385 state:D stack:0 pid:4347 tgid:4347 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae0dd84 r8:00000002 r7:60000113 r6:eae0dd8c r5:85180000 r4:85180000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85180000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae0de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852904c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85180000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac7b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f8f8c r4:851f8c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f8f8c r4:85293280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85180000 r8:852932ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85293280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85293280 r8:80287e08 r7:eae09e60 r6:850a5b00 r5:85180000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae0dfb0 to 0xeae0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852904c0 INFO: task kworker/0:385:4347 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 87c9e000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:851f938c r4:851f9000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f938c r4:85293300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8525ec00 r8:8529332c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85293300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85293300 r8:80287e08 r7:eae09e60 r6:85293380 r5:8525ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeade9fb0 to 0xeade9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85290780 INFO: task kworker/0:386:4349 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 87ec8000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 INFO: task kworker/0:387:4353 blocked for more than 458 seconds. r10:8291a684 r9:eae11d84 r8:00000002 r7:60000013 r6:eae11d8c r5:8525e000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851fa78c r4:851fa400 r10:61c88647 r9:8525e000 r8:8529342c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8525c800 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 r5:851f9f8c r4:851f9c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f9f8c r4:85293500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8525c800 r8:8529352c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85293500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85293500 r8:80287e08 r7:eae11e60 r6:85293580 r5:8525c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadf9fb0 to 0xeadf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85290a00 INFO: task kworker/0:388:4354 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 88024000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:233:4355 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:233 state:D stack:0 pid:4355 tgid:4355 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae1dd84 r8:00000002 r7:60000113 r6:eae1dd8c r5:84818000 r4:84818000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84818000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae1de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85299e40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84818000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8514b38c r4:8514b000 r10:61c88647 r9:84818000 r8:850a5bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85299940 INFO: task kworker/1:233:4355 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 88307000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85d2778c r4:85d27400 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851fa38c r4:851fa000 r7:dddced80 r6:83018000 r5:851fa38c r4:85293680 r10:00000000 r9:85293680 r8:80287e08 r7:eae11e60 r6:850a5c00 r5:85182400 r4:85290dc0 Call trace: 1d20: 88713000 ed6eb000 00000001 80239b98 7f047000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:390 state:D stack:0 pid:4362 tgid:4362 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae21e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:851fab8c r4:851fa800 r4:85293700 Exception stack(0xeae21fb0 to 0xeae21ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 887ef000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:391:4364 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:391 state:D stack:0 pid:4364 tgid:4364 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eace1d84 r8:00000002 r7:60000013 r6:eace1d8c r5:85183c00 r4:85183c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85183c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529e6c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85183c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0185000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851fb38c r4:851fb000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851fb38c r4:85293780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85183c00 r8:852937ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85293780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85293780 r8:80287e08 r7:eae21e60 r6:850a5d00 r5:85183c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace1fb0 to 0xeace1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: 88c1d000 ed6eb000 00000001 80239b98 7f047000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r5:85d2778c r4:85d27400 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:392:4365 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:392 state:D stack:0 pid:4365 tgid:4365 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead51d84 r8:00000002 r7:60000113 r6:ead51d8c r5:85184800 r4:85184800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85184800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead51e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529e4c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85184800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:851faf8c r4:851fac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85184800 r8:8529382c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: 88c1d000 ed6eb000 00000001 80239b98 7f047000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:393:4369 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:393 state:D stack:0 pid:4369 tgid:4369 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacc1d84 r8:00000002 r7:60000113 r6:eacc1d8c r5:85185400 r4:85185400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85185400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529e800 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:851fb78c r4:851fb400 r7:dddced80 r6:83018000 r5:851fb78c r4:85293880 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r4:dffe1dc0 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead69e08 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:851fbb8c r4:851fb800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851fbb8c r4:85293900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85186000 r8:8529392c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85293900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85293900 r8:80287e08 r7:eacc1e60 r6:850a5e80 r5:85186000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead69fb0 to 0xead69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8529e680 INFO: task kworker/0:394:4371 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 89058000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:234:4372 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:234 state:D stack:0 pid:4372 tgid:4372 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead75d84 r8:00000002 r7:60000013 r6:ead75d8c r5:85186c00 r4:85186c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85186c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead75e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a23c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85186c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8442838c r4:84428000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8442838c r4:850a5f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85186c00 r8:850a5f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850a5f00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a5f00 r8:80287e08 r7:eae1de60 r6:850a5f80 r5:85186c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead75fb0 to 0xead75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85299dc0 INFO: task kworker/1:234:4372 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 89058000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:395:4374 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:395 state:D stack:0 pid:4374 tgid:4374 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae25d84 r8:00000002 r7:60000113 r6:eae25d8c r5:85181800 r4:85181800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85181800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae25e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529eb80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85181800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06bd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520438c r4:85204000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520438c r4:85293980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85181800 r8:852939ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85293980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85293980 r8:80287e08 r7:ead69e60 r6:852a0000 r5:85181800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae25fb0 to 0xeae25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8529e7c0 INFO: task kworker/0:395:4374 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 1d20: 89439000 ed6eb000 00000001 80239b98 7f047000 00000001 r5:80070013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:00000000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:396:4375 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:396 state:D stack:0 pid:4375 tgid:4375 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae29d84 r8:00000002 r7:60000013 r6:eae29d8c r5:85180c00 r4:85180c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85180c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae29e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529e7c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85180c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0675000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851fbf8c r4:851fbc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851fbf8c r4:85293a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85180c00 r8:85293a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85293a00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85293a00 r8:80287e08 r7:eae25e60 r6:852a0080 r5:85180c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae29fb0 to 0xeae29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8529ea00 INFO: task kworker/0:396:4375 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 89806000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r4:8517c800 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8517c800 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 r5:8520478c r4:85204400 r4:85293a80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:398:4380 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:398 state:D stack:0 pid:4380 tgid:4380 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae31d84 r8:00000002 r7:60000013 r6:eae31d8c r5:85188000 r4:85188000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85188000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae31e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529ee80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85188000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0751000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85204b8c r4:85204800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85204b8c r4:85293b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85188000 r8:85293b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85293b00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85293b00 r8:80287e08 r7:eae2de60 r6:852a0180 r5:85188000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae31fb0 to 0xeae31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8529eb00 INFO: task kworker/0:398:4380 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 89806000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:8291a684 r9:eae41d84 r8:00000002 r7:60000113 r6:eae41d8c r5:85188c00 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:85204f8c r4:85204c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85293b80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: 89c42000 ed6eb000 00000001 80239b98 7f047000 00000001 r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:235:4383 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:235 state:D stack:0 pid:4383 tgid:4383 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae45d84 r8:00000002 r7:60000113 r6:eae45d8c r5:85189800 r4:85189800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85189800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae45e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eacf3000 r5:8514bb8c r4:8514b800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:400:4385 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:400 state:D stack:0 pid:4385 tgid:4385 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae49d84 r8:00000002 r7:60000113 r6:eae49d8c r5:8518a400 r4:8518a400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8518a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae49e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85290dc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8518a400 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88a7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520538c r4:85205000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520538c r4:85293c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8518a400 r8:85293c2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeae49fb0 to 0xeae49ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:dffe1dc0 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r4:848d9e00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae4dd84 r8:00000002 r7:60000013 r6:eae4dd8c r5:8518b000 r4:8518b000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8518b000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae4de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529a0c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8518b000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa0d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520578c r4:85205400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520578c r4:85293c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8518b000 r8:85293cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85293c80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85293c80 r8:80287e08 r7:eae49e60 r6:852a0400 r5:8518b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae4dfb0 to 0xeae4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8529ef80 INFO: task kworker/0:401:4387 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:402:4389 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:402 state:D stack:0 pid:4389 tgid:4389 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae51d84 r8:00000002 r7:60000013 r6:eae51d8c r5:8518bc00 r4:8518bc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae51e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85205b8c r4:85205800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: 8a42a000 ed6eb000 00000001 80239b98 7f047000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdffe1fb0 to 0xdffe1ff8) Not tainted 6.15.0-rc5-syzkaller #0 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8518c800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r5:85205f8c r4:85205c00 r4:85293d80 Exception stack(0xeae55fb0 to 0xeae55ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:dffe1dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 task:kworker/0:404 state:D stack:0 pid:4393 tgid:4393 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8518d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8518d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae59e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529a840 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8518d400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaabb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85206b8c r4:85206800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85206b8c r4:85293e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8518d400 r8:85293e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85293e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85293e00 r8:80287e08 r7:eae55e60 r6:852a0580 r5:8518d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae59fb0 to 0xeae59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8529a040 INFO: task kworker/0:404:4393 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 8a91f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:405:4395 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeae5dfb0 to 0xeae5dff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r4:00000000 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:406:4397 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:406 state:D stack:0 pid:4397 tgid:4397 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae61d84 r8:00000002 r7:60000113 r6:eae61d8c r5:8518ec00 r4:8518ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8518ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae61e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529a700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8520678c r4:85206400 r7:dddced80 r6:83018000 r5:8520678c r4:85293f00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:00000000 r5:85d2778c r4:85d27400 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaad1000 r5:85206f8c r4:85206c00 r4:85293f80 Exception stack(0xeae6dfb0 to 0xeae6dff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae75e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529aac0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85193000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaef000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520738c r4:85207000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520738c r4:85294000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85193000 r8:8529402c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85294000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85294000 r8:80287e08 r7:eae6de60 r6:852a0780 r5:85193000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae75fb0 to 0xeae75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8529a540 INFO: task kworker/0:408:4402 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 8ae5b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:409:4404 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:409 state:D stack:0 pid:4404 tgid:4404 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae79d84 r8:00000002 r7:60000113 r6:eae79d8c r5:85190c00 r4:85190c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85190c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae79e08 r4:00000000 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8520778c r4:85294080 r10:00000000 r9:85294080 r8:80287e08 r7:eae75e60 r6:852a0800 r5:85190c00 r4:8529a8c0 Call trace: 1d20: 8b0fc000 ed6eb000 00000001 80239b98 7f047000 00000001 r4:dffe1dc0 r5:00001000 r4:eb64f000 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529aec0 r5:85207f8c r4:85207c00 r7:dddced80 r6:83018000 r5:85207f8c r4:85294100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85190000 r8:8529412c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85294100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85294100 r8:80287e08 r7:eae79e60 r6:852a0880 r5:85190000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae7dfb0 to 0xeae7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8529aa80 INFO: task kworker/0:410:4405 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 8b0fc000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:411:4407 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:411 state:D stack:0 pid:4407 tgid:4407 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae81d84 r8:00000002 r7:60000013 r6:eae81d8c r5:85193c00 r4:85193c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85193c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae81e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529adc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:85207b8c r4:85207800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85294180 Exception stack(0xeae81fb0 to 0xeae81ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:00000000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:412:4409 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:412 state:D stack:0 pid:4409 tgid:4409 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae85d84 r8:00000002 r7:60000013 r6:eae85d8c r5:85194800 r4:85194800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85194800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae85e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529e400 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85194800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab6d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520838c r4:85208000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520838c r4:85294200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85194800 r8:8529422c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85294200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85294200 r8:80287e08 r7:eae7de60 r6:852a0980 r5:85194800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae85fb0 to 0xeae85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8529acc0 INFO: task kworker/0:412:4409 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 8b89e000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 r5:00001000 r4:eb64f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eab93000 r5:8520878c r4:85208400 r10:61c88647 r9:85195400 r8:852942ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: 8b89e000 ed6eb000 00000001 80239b98 7f047000 00000001 r4:dffe1dc0 r5:00001000 r4:eb64f000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:414:4413 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:414 state:D stack:0 pid:4413 tgid:4413 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae8dd84 r8:00000002 r7:60000013 r6:eae8dd8c r5:85196000 r4:85196000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85196000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae8de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529cd40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85196000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab83000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514b78c r4:8514b400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8514b78c r4:85294300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85196000 r8:8529432c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85294300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85294300 r8:80287e08 r7:eae89e60 r6:852a0a80 r5:85196000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae8dfb0 to 0xeae8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8529ae00 INFO: task kworker/0:414:4413 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 r5:85208f8c r4:85208c00 r7:dddced80 r6:83018000 r5:85208f8c r4:85294380 Exception stack(0xeae91fb0 to 0xeae91ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/0:416:4417 blocked for more than 459 seconds. r4:85192400 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae95e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a4140 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85192400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabbf000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85208b8c r4:85208800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85208b8c r4:85294400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85192400 r8:8529442c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85294400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85294400 r8:80287e08 r7:eae91e60 r6:852a0d00 r5:85192400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae95fb0 to 0xeae95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852a4100 INFO: task kworker/0:416:4417 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 8c01b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r4:85198000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ead03000 r5:8520938c r4:85209000 r4:85294480 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r4:00000000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ead43000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520978c r4:85209400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520978c r4:85294500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85198c00 r8:8529452c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85294500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85294500 r8:80287e08 r7:eae99e60 r6:852a0e80 r5:85198c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae69fb0 to 0xeae69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852a42c0 INFO: task kworker/0:418:4422 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 8c1d1000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:236:4423 blocked for more than 459 seconds. r5:85199800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae9de08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8514bf8c r4:8514bc00 r4:852a0e00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) task:kworker/0:419 state:D stack:0 pid:4425 tgid:4425 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85209b8c r4:85294580 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:420:4427 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:420 state:D stack:0 pid:4427 tgid:4427 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaea9d84 r8:00000002 r7:60000013 r6:eaea9d8c r5:8481b000 r4:8481b000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8481b000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a4280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8481b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf4b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520ab8c r4:8520a800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520ab8c r4:85294680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8481b000 r8:852946ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85294680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85294680 r8:80287e08 r7:eae65e60 r6:85294700 r5:8481b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaea9fb0 to 0xeaea9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852a4400 INFO: task kworker/0:420:4427 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r4:00000000 r5:85d2778c r4:85d27400 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:84428b8c r4:84428800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:00000000 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:00000000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaee9d84 r8:00000002 r7:60000113 r6:eaee9d8c r5:8481c800 r4:8481c800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8481c800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a26c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8481c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8442878c r4:84428400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8442878c r4:852a0c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8481c800 r8:852a0c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852a0c00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a0c00 r8:80287e08 r7:eaec5e60 r6:85294800 r5:8481c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee9fb0 to 0xeaee9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852a2340 INFO: task kworker/1:238:4433 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 8cc9f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/1:239:4434 blocked for more than 459 seconds. r10:8291a684 r9:eaeedd84 r8:00000002 r7:60000113 r6:eaeedd8c r5:8481d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeede08 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8531178c r4:85311400 r4:852a0c80 Exception stack(0xeaeedfb0 to 0xeaeedff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 1d20: 8cfac000 ed6eb000 00000001 80239b98 7f047000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:240:4435 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:240 state:D stack:0 pid:4435 tgid:4435 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaef1d84 r8:00000002 r7:60000113 r6:eaef1d8c r5:8481e000 r4:8481e000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8481e000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a2880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8481e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaef5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8442ab8c r4:8442a800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8442ab8c r4:852a0b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8481e000 r8:852a0bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852a0b80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a0b80 r8:80287e08 r7:eaeede60 r6:85294900 r5:8481e000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef1fb0 to 0xeaef1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:421:4437 blocked for more than 459 seconds. r4:8481ec00 r4:00000000 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8481ec00 r8:852949ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r5:85d2778c r4:85d27400 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf29d84 r8:00000002 r7:60000113 r6:eaf29d8c r5:8519bc00 r4:8519bc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8519bc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf29e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b1040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8519bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacf000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8531038c r4:85310000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8531038c r4:8529b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8519bc00 r8:8529b02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8529b000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529b000 r8:80287e08 r7:eaeede60 r6:8529b080 r5:8519bc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf29fb0 to 0xeaf29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852a25c0 INFO: task kworker/1:241:4439 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 8d5df000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8519c800 r8:85294aac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: 8d657000 ed6eb000 00000001 80239b98 7f047000 00000001 r4:dffe1dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8520a78c r4:8520a400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85294b00 r8:80287e08 r7:eaea9e60 r6:8529b180 r5:8519a400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852a4d00 INFO: task kworker/0:423:4442 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 8d657000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:424:4446 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:424 state:D stack:0 pid:4446 tgid:4446 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf65d84 r8:00000002 r7:60000013 r6:eaf65d8c r5:8519d400 r4:8519d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8519d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf65e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a9040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8519d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf57000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520af8c r4:8520ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520af8c r4:85294b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8519d400 r8:85294bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85294b80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85294b80 r8:80287e08 r7:eaea9e60 r6:8529b200 r5:8519d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf65fb0 to 0xeaf65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852a9000 INFO: task kworker/0:424:4446 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 8d971000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eaf69d84 r8:00000002 r7:60000013 r6:eaf69d8c r5:8519b000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520b78c r4:8520b400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdffe1fb0 to 0xdffe1ff8) r4:848cab40 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:8519ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 r5:8520b38c r4:8520b000 r10:61c88647 r9:8519ec00 r8:85294cac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r5:85d2778c r4:85d27400 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8519e000 r4:8291a680 r4:00000000 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520bb8c r4:8520b800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520bb8c r4:85294d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8519e000 r8:85294d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85294d00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85294d00 r8:80287e08 r7:eaf69e60 r6:8529b380 r5:8519e000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf81fb0 to 0xeaf81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852a92c0 INFO: task kworker/0:427:4451 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 8dcba000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:428:4453 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:428 state:D stack:0 pid:4453 tgid:4453 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf8dd84 r8:00000002 r7:60000013 r6:eaf8dd8c r5:85348000 r4:85348000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85348000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf8de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf99d84 r8:00000002 r7:60000113 r6:eaf99d8c r5:85348c00 r4:85348c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85348c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf99e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a9880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85348c00 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9d3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520c38c r4:8520c000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520c38c r4:85294e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85348c00 r8:85294e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85294e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85294e00 r8:80287e08 r7:eaf8de60 r6:8529b480 r5:85348c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf99fb0 to 0xeaf99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852a9400 INFO: task kworker/0:429:4455 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e0067000 r5:8531078c r4:85310400 r7:ddde2d80 r6:83018200 r5:8531078c r4:8529b500 r10:00000000 r9:8529b500 r8:80287e08 r7:eaeede60 r6:8529b580 r5:8534b000 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/0:430:4461 blocked for more than 459 seconds. r4:8534bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf9de08 r4:00000000 r5:8520c78c r4:8520c400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520c78c r4:85294e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8534bc00 r8:85294eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85294e80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85294e80 r8:80287e08 r7:eaf99e60 r6:8529b600 r5:8534bc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf9dfb0 to 0xeaf9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852a9a00 INFO: task kworker/0:430:4461 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 8ea09000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:431:4462 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:431 state:D stack:0 pid:4462 tgid:4462 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:8534a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa1e08 r9:83018005 r8:8534a400 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 r5:8520cb8c r4:8520c800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 INFO: task kworker/0:431:4462 is blocked on a mutex likely owned by task kworker/0:115:3602. 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8534c800 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 r5:8520e38c r4:8520e000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:433:4465 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:433 state:D stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafa9d84 r8:00000002 r7:60000113 r6:eafa9d8c r5:8534d400 r4:8534d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8534d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524db00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8534d400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead9b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520cf8c r4:8520cc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520cf8c r4:852ae000 r4:852ae000 9fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b1940 r5:85310b8c r4:85310800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8481a400 r8:8529b82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8529b800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529b800 r8:80287e08 r7:eaeede60 r6:852ae080 r5:8481a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf35fb0 to 0xeaf35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852b1740 INFO: task kworker/1:243:4467 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 8f1d9000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:244:4469 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:244 state:D stack:0 pid:4469 tgid:4469 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:84708c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb1e08 r5:00001000 r4:e00fb000 r5:85310f8c r4:85310c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84708c00 r8:8529b8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:dffe1dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:245:4471 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:245 state:D stack:0 pid:4471 tgid:4471 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafb9d84 r8:00000002 r7:60000113 r6:eafb9d8c r5:8470a400 r4:8470a400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8470a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b1b80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8470a400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e013f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8531138c r4:85311000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8531138c r4:8529b900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8470a400 r8:8529b92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8529b900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529b900 r8:80287e08 r7:eaeede60 r6:852ae180 r5:8470a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafb9fb0 to 0xeafb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852b1840 INFO: task kworker/1:245:4471 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r5:00001000 r4:eb64f000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e0557000 r5:85311b8c r4:85311800 r10:61c88647 r9:84709800 r8:8529b9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:00000000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85291880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84708000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac45000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85313f8c r4:85313c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85313f8c r4:8529ba00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84708000 r8:8529ba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8529ba00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529ba00 r8:80287e08 r7:eafc1e60 r6:852ae280 r5:84708000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc9fb0 to 0xeafc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852b1dc0 INFO: task kworker/1:247:4475 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 8fd09000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:248:4477 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85311f8c r4:85311c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85311f8c r4:8529ba80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8470b000 r8:8529baac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8529ba80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529ba80 r8:80287e08 r7:eafc9e60 r6:852ae300 r5:8470b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafd1fb0 to 0xeafd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852b1c80 INFO: task kworker/1:248:4477 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 90151000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/1:249:4479 blocked for more than 459 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafd9d84 r8:00000002 r7:60000113 r6:eafd9d8c r5:8470d400 r4:8470d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8470d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b10c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8470d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4821000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8531238c r4:85312000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8531238c r4:8529bb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8470d400 r8:8529bb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8529bb00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:250:4481 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:250 state:D stack:0 pid:4481 tgid:4481 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafe1d84 r8:00000002 r7:60000113 r6:eafe1d8c r5:8470c800 r4:8470c800 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:8531278c r4:85312400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:dffe1dc0 r5:00001000 r4:eb64f000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8470bc00 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85312b8c r4:85312800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8529bc00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:252:4485 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:252 state:D stack:0 pid:4485 tgid:4485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaff1d84 r8:00000002 r7:60000113 r6:eaff1d8c r5:8470e000 r4:8470e000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8470e000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85291340 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8470e000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea967000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85312f8c r4:85312c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85312f8c r4:8529bc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8470e000 r8:8529bcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8529bc80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:253 state:D stack:0 pid:4487 tgid:4487 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff9e08 r9:83018205 r8:84ae8000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r5:00001000 r4:ea9c1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8531338c r4:85313000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8531338c r4:8529bd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ae8000 r8:8529bd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8529bd00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529bd00 r8:80287e08 r7:eafc9e60 r6:852ae580 r5:84ae8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaff9fb0 to 0xeaff9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85291140 INFO: task kworker/1:253:4487 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 90e06000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae01e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdffe1fb0 to 0xdffe1ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8534ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaffde08 r9:83018205 r8:8534ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 r5:85313b8c r4:85313800 r10:61c88647 r9:8534ec00 r8:8529beac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Call trace: r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 91548000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:256:4494 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:256 state:D stack:0 pid:4494 tgid:4494 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb001d84 r8:00000002 r7:60000013 r6:eb001d8c r5:85349800 r4:85349800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85349800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb001e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85291b80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85349800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac73000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8531c78c r4:8531c400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8531c78c r4:8529bf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85349800 r8:8529bfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8529bf80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529bf80 r8:80287e08 r7:eafc9e60 r6:85248000 r5:85349800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb001fb0 to 0xeb001ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 91548000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:eaf01d84 r8:00000002 r7:60000013 r6:eaf01d8c r5:85350000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852919c0 r5:8531c38c r4:8531c000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85248080 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r4:85350c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb009e08 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8531d38c r4:85248180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85350c00 r8:852481ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85248180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85248180 r8:80287e08 r7:eb001e60 r6:85248200 r5:85350c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb009fb0 to 0xeb009ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85291840 INFO: task kworker/1:258:4497 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 919dc000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:259:4499 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:259 state:D stack:0 pid:4499 tgid:4499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb00dd84 r8:00000002 r7:60000013 r6:eb00dd8c r5:85351800 r4:85351800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85351800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eac8b000 r5:8531cb8c r4:8531c800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85351800 r8:852482ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 91e79000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:260:4501 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:260 state:D stack:0 pid:4501 tgid:4501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb011d84 r8:00000002 r7:60000013 r6:eb011d8c r5:85353000 r4:85353000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85353000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb011e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85291ec0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85353000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8531cf8c r4:8531cc00 r7:ddde2d80 r6:83018200 r5:8531cf8c r4:85248380 r10:00000000 r9:85248380 r8:80287e08 r7:eb009e60 r6:85248400 r5:85353000 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:85d2778c r4:85d27400 r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/1:261:4503 blocked for more than 460 seconds. r4:85352400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb019e08 r9:83018205 r8:85352400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 r5:8531db8c r4:8531d800 r10:61c88647 r9:85352400 r8:852484ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:262:4505 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:262 state:D stack:0 pid:4505 tgid:4505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb01dd84 r8:00000002 r7:60000113 r6:eb01dd8c r5:84ae8c00 r4:84ae8c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ae8c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb01de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523b040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ae8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead7f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8531d78c r4:8531d400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8531d78c r4:85248580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ae8c00 r8:852485ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85248580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdffe1fb0 to 0xdffe1ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85355400 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8531df8c r4:85248600 r10:00000000 r9:85248600 r8:80287e08 r7:eb019e60 r6:85248680 r5:85355400 r4:8523b180 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:264:4511 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:264 state:D stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb029d84 r8:00000002 r7:60000013 r6:eb029d8c r5:85353c00 r4:85353c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85353c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb029e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:8531e38c r4:8531e000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85353c00 r8:8524872c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85356000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 r5:8531e78c r4:8531e400 r10:61c88647 r9:85356000 r8:8524882c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffe1d28 to 0xdffe1d70) [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:266:4515 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:266 state:D stack:0 pid:4515 tgid:4515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb049d84 r8:00000002 r7:60000013 r6:eb049d8c r5:85358000 r4:85358000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85358000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb049e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523bb40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85358000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb03f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8531eb8c r4:8531e800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8531eb8c r4:85248900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85358000 r8:8524892c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85248900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85248900 r8:80287e08 r7:eb02de60 r6:85248980 r5:85358000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb049fb0 to 0xeb049ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8523b800 INFO: task kworker/1:266:4515 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85359800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 r5:8531ef8c r4:8531ec00 r10:61c88647 r9:85359800 r8:85248a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:434:4518 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:434 state:D stack:0 pid:4518 tgid:4518 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb025d84 r8:00000002 r7:60000113 r6:eb025d8c r5:8535a400 r4:8535a400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8535a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb025e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524dd80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8535a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb05f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520d78c r4:8520d400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520d78c r4:852ae680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8535a400 r8:852ae6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852ae680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ae680 r8:80287e08 r7:eafa5e60 r6:85248b00 r5:8535a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb025fb0 to 0xeb025ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8524db40 INFO: task kworker/0:434:4518 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8535bc00 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524dc00 r5:8520d38c r4:8520d000 r7:ddde2d80 r6:83018200 r5:8520d38c r4:85248b80 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) r4:848cab40 Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:435 state:D stack:0 pid:4522 tgid:4522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb015d84 r8:00000002 r7:60000113 r6:eb015d8c r5:84ae9800 r4:84ae9800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ae9800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb015e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522b880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ae9800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb81000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520df8c r4:8520dc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520df8c r4:852ae700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ae9800 r8:852ae72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852ae700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ae700 r8:80287e08 r7:eafa5e60 r6:852ae780 r5:84ae9800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb015fb0 to 0xeb015ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8524db80 INFO: task kworker/0:435:4522 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 93aa2000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb059e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523d2c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84aeb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb077000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8531f38c r4:8531f000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8531f38c r4:85248c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85248c80 r8:80287e08 r7:eb04de60 r6:852ae800 r5:84aeb000 INFO: task kworker/1:269:4523 is blocked on a mutex likely owned by task kworker/0:115:3602. 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/1:270:4526 blocked for more than 460 seconds. r4:84aed400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb085e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r5:00001000 r4:eb64f000 r4:848d9e00 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:271:4529 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:271 state:D stack:0 pid:4529 tgid:4529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0a1d84 r8:00000002 r7:60000113 r6:eb0a1d8c r5:84aee000 r4:84aee000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aee000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523d440 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84aee000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb087000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8531f78c r4:8531f400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8531f78c r4:85248d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aee000 r8:85248dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85248d80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85248d80 r8:80287e08 r7:eb085e60 r6:852ae900 r5:84aee000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0a1fb0 to 0xeb0a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8523d240 INFO: task kworker/1:271:4529 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 93f5a000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8531ff8c r4:8531fc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85248e00 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9436e000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:273:4532 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:273 state:D stack:0 pid:4532 tgid:4532 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0b5d84 r8:00000002 r7:60000013 r6:eb0b5d8c r5:84aea400 r4:84aea400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aea400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523d800 r5:8532438c r4:85324000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85248e80 r8:80287e08 r7:eb0a5e60 r6:852aea00 r5:84aea400 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:dffe1dc0 r5:00001000 r4:eb64f000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:274:4534 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:274 state:D stack:0 pid:4534 tgid:4534 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0c5d84 r8:00000002 r7:60000113 r6:eb0c5d8c r5:84aec800 r4:84aec800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aec800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:8532478c r4:85324400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84aec800 r8:85248f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xdffe1d28 to 0xdffe1d70) 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:8535b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85324f8c r4:85324c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85324f8c r4:85248f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8535b000 r8:85248fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85248f80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85248f80 r8:80287e08 r7:eb0c5e60 r6:85232000 r5:8535b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb069fb0 to 0xeb069ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8523d780 INFO: task kworker/1:275:4536 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 94da3000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 INFO: task kworker/1:276:4538 blocked for more than 460 seconds. r4:8535c800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb075e08 r5:00001000 r4:eb0d3000 r5:85324b8c r4:85324800 r7:ddde2d80 r6:83018200 r5:85324b8c r4:85232080 r10:00000000 r9:85232080 r8:80287e08 r7:eb069e60 r6:85232100 r5:8535c800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:00000000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:277:4540 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:277 state:D stack:0 pid:4540 tgid:4540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0ddd84 r8:00000002 r7:60000013 r6:eb0ddd8c r5:8535d400 r4:8535d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8535d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0dde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523df00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8535d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 r5:00001000 r4:eb0f7000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8535d400 r8:852321ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:278 state:D stack:0 pid:4542 tgid:4542 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85232280 r8:80287e08 r7:eb0dde60 r6:85232300 r5:8535e000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Call trace: 1d20: 9588d000 ed6eb000 00000001 80239b98 7f047000 00000001 r4:dffe1dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:279:4544 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:279 state:D stack:0 pid:4544 tgid:4544 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0f5d84 r8:00000002 r7:60000113 r6:eb0f5d8c r5:8535ec00 r4:8535ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8535ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523dfc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8535ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb103000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85325b8c r4:85325800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85325b8c r4:85232380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8535ec00 r8:852323ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85232380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85232380 r8:80287e08 r7:eb0dde60 r6:85232400 r5:8535ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f5fb0 to 0xeb0f5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:280 state:D stack:0 pid:4546 tgid:4546 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532638c r4:85326000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532638c r4:85232480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85358c00 r8:852324ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85232480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85232480 r8:80287e08 r7:eb0f5e60 r6:85232500 r5:85358c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb101fb0 to 0xeb101ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8523dec0 INFO: task kworker/1:280:4546 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9588d000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:281:4548 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb10de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524dec0 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:282:4550 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:282 state:D stack:0 pid:4550 tgid:4550 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb119d84 r8:00000002 r7:60000013 r6:eb119d8c r5:85356c00 r4:85356c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85356c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb119e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85220040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r5:00001000 r4:eb64f000 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xdffe1d28 to 0xdffe1d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:284:4554 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:284 state:D stack:0 pid:4554 tgid:4554 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb131d84 r8:00000002 r7:60000113 r6:eb131d8c r5:85368c00 r4:85368c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85368c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb131e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85368c00 r8:852328ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:00000000 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:285 state:D stack:0 pid:4556 tgid:4556 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf45e08 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85398f8c r4:85232980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8536a400 r8:852329ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85232980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85232980 r8:80287e08 r7:eb125e60 r6:85232a00 r5:8536a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf45fb0 to 0xeaf45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85220240 INFO: task kworker/1:285:4556 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9680c000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:436:4559 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:436 state:D stack:0 pid:4559 tgid:4559 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf5dd84 r8:00000002 r7:60000113 r6:eaf5dd8c r5:85369800 r4:85369800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85369800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522bac0 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520e78c r4:8520e400 r10:61c88647 r9:85369800 r8:852aeb2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeaf5dfb0 to 0xeaf5dff8) r4:8522b840 Call trace: 1d20: 96d95000 ed6eb000 00000001 80239b98 7f047000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf7dd84 r8:00000002 r7:60000013 r6:eaf7dd8c r5:8536b000 r4:8536b000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8536b000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf7de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522bc00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8536b000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff3f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520eb8c r4:8520e800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520eb8c r4:852aeb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8536b000 r8:852aebac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852aeb80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852aeb80 r8:80287e08 r7:eaf5de60 r6:85232b00 r5:8536b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf7dfb0 to 0xeaf7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8522bb40 INFO: task kworker/0:437:4561 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 96d95000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:848cab40 r4:8536c800 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 1d20: 96d95000 ed6eb000 00000001 80239b98 7f047000 00000001 r5:00001000 r4:eb64f000 r4:848d9e00 1fa0: 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb145e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522be80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8536e000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05b7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520f38c r4:8520f000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520f38c r4:852aec80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8536e000 r8:852aecac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852aec80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852aec80 r8:80287e08 r7:eb141e60 r6:85232c00 r5:8536e000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb145fb0 to 0xeb145ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8522bbc0 INFO: task kworker/0:439:4565 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 96d95000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 Not tainted 6.15.0-rc5-syzkaller #0 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:852aed00 r8:80287e08 r7:eb145e60 r6:85232c80 r5:8536bc00 Call trace: 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:00000000 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:286:4570 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:286 state:D stack:0 pid:4570 tgid:4570 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb14dd84 r8:00000002 r7:60000113 r6:eb14dd8c r5:8536d400 r4:8536d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8536d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb14de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b8a80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8536d400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac53000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532778c r4:85327400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532778c r4:85232d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8536d400 r8:85232d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85232d00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85232d00 r8:80287e08 r7:eaf45e60 r6:85232d80 r5:8536d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb14dfb0 to 0xeb14dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85220d40 INFO: task kworker/1:286:4570 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 1d60: 80230ad0 80239bb0 80070013 ffffffff [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 INFO: task kworker/0:441:4571 blocked for more than 460 seconds. r5:85360000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522b580 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85360000 r8:852aedac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb151fb0 to 0xeb151ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8522bec0 INFO: task kworker/0:441:4571 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9791b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:848d9e00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eb64f000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eb15dd84 r8:00000002 r7:60000113 r6:eb15dd8c r5:85362400 r4:85362400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85362400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb15de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a9280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85362400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520ff8c r4:8520fc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520ff8c r4:852aee80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85362400 r8:852aeeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852aee80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852aee80 r8:80287e08 r7:eb159e60 r6:85232f00 r5:85362400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb15dfb0 to 0xeb15dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8522bd80 INFO: task kworker/0:443:4574 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 97f88000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xdffe1fb0 to 0xdffe1ff8) Workqueue: events bpf_prog_free_deferred r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85363c00 r8:852aef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852aef00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852aef00 r8:80287e08 r7:eb159e60 r6:85232f80 r5:85363c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb165fb0 to 0xeb165ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852a9740 INFO: task kworker/0:444:4576 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9859f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:445:4577 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:445 state:D stack:0 pid:4577 tgid:4577 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb169d84 r8:00000002 r7:60000113 r6:eb169d8c r5:85364800 r4:85364800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85364800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb169e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85228440 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85364800 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538478c r4:85384400 r10:61c88647 r9:85364800 r8:852aefac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb169fb0 to 0xeb169ff8) Workqueue: events bpf_prog_free_deferred 1d20: 9859f000 ed6eb000 00000001 80239b98 7f047000 00000001 r4:00000000 r5:85d2778c r4:85d27400 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eb175d84 r8:00000002 r7:600f0013 r6:eb175d8c r5:85365400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852286c0 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85365400 r8:8523a02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523a000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523a000 r8:80287e08 r7:eb169e60 r6:85235080 r5:85365400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb175fb0 to 0xeb175ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85228240 INFO: task kworker/0:446:4581 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9859f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:447:4582 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:447 state:D stack:0 pid:4582 tgid:4582 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb179d84 r8:00000002 r7:60000113 r6:eb179d8c r5:85366c00 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85384b8c r4:85384800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeb179fb0 to 0xeb179ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred r4:00000000 1d20: 9859f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:448:4584 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:448 state:D stack:0 pid:4584 tgid:4584 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb181d84 r8:00000002 r7:60000013 r6:eb181d8c r5:85360c00 r4:85360c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85360c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb181e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85228940 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85360c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaadf000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538578c r4:85385400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538578c r4:8523a100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85360c00 r8:8523a12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523a100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523a100 r8:80287e08 r7:eb175e60 r6:85235180 r5:85360c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb181fb0 to 0xeb181ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852282c0 INFO: task kworker/0:448:4584 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 98bc6000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:449:4586 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:449 state:D stack:0 pid:4586 tgid:4586 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb189d84 r8:00000002 r7:60000113 r6:eb189d8c r5:85363000 r4:85363000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85363000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb189e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85228800 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538538c r4:85385000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538538c r4:8523a180 r10:61c88647 r9:85363000 r8:8523a1ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:8523a180 r8:80287e08 r7:eb181e60 r6:85235200 r5:85363000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 99195000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:450:4588 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:450 state:D stack:0 pid:4588 tgid:4588 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb191d84 r8:00000002 r7:60000113 r6:eb191d8c r5:85366000 r4:85366000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85366000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb191e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85228d00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85366000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab63000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538638c r4:85386000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538638c r4:8523a200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85366000 r8:8523a22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523a200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523a200 r8:80287e08 r7:eb181e60 r6:85235280 r5:85366000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb191fb0 to 0xeb191ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85228680 INFO: task kworker/0:450:4588 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 996af000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:451:4590 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:451 state:D stack:0 pid:4590 tgid:4590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb199d84 r8:00000002 r7:60000013 r6:eb199d8c r5:85370c00 r4:85370c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85370c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb199e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85228a40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85370c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab07000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85385b8c r4:85385800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85385b8c r4:8523a280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85370c00 r8:8523a2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523a280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523a280 r8:80287e08 r7:eb191e60 r6:85235300 r5:85370c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb199fb0 to 0xeb199ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85228980 INFO: task kworker/0:451:4590 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 996af000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:452:4592 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:452 state:D stack:0 pid:4592 tgid:4592 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1a1d84 r8:00000002 r7:60000013 r6:eb1a1d8c r5:85370000 r4:85370000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85370000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85228bc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85370000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab33000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85385f8c r4:85385c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85385f8c r4:8523a300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85370000 r8:8523a32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523a300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523a300 r8:80287e08 r7:eb191e60 r6:85235380 r5:85370000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a1fb0 to 0xeb1a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852287c0 INFO: task kworker/0:452:4592 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 99b41000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:453:4596 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:453 state:D stack:0 pid:4596 tgid:4596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1a9d84 r8:00000002 r7:60000113 r6:eb1a9d8c r5:85371800 r4:85371800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85371800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85228e80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85371800 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab7f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538678c r4:85386400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538678c r4:8523a380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85371800 r8:8523a3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523a380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523a380 r8:80287e08 r7:eb191e60 r6:85235400 r5:85371800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a9fb0 to 0xeb1a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85228dc0 INFO: task kworker/0:453:4596 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 99b41000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:454:4598 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:454 state:D stack:0 pid:4598 tgid:4598 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1add84 r8:00000002 r7:60000013 r6:eb1add8c r5:85373000 r4:85373000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85373000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1ade08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85228100 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85373000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab9f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85386b8c r4:85386800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85386b8c r4:8523a400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85373000 r8:8523a42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523a400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523a400 r8:80287e08 r7:eb1a9e60 r6:85235480 r5:85373000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1adfb0 to 0xeb1adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85228f40 INFO: task kworker/0:454:4598 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9a1a5000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:455:4599 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:455 state:D stack:0 pid:4599 tgid:4599 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1b9d84 r8:00000002 r7:60000013 r6:eb1b9d8c r5:85373c00 r4:85373c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85373c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85220900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85373c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabc7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85386f8c r4:85386c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85386f8c r4:8523a480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85373c00 r8:8523a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523a480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523a480 r8:80287e08 r7:eb1ade60 r6:85235500 r5:85373c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b9fb0 to 0xeb1b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852208c0 INFO: task kworker/0:455:4599 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9a1a5000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:456:4601 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:456 state:D stack:0 pid:4601 tgid:4601 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1bdd84 r8:00000002 r7:60000113 r6:eb1bdd8c r5:85374800 r4:85374800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85374800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1bde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524da00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85374800 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eace5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538738c r4:85387000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538738c r4:8523a500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85374800 r8:8523a52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523a500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523a500 r8:80287e08 r7:eb1b9e60 r6:85235580 r5:85374800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1bdfb0 to 0xeb1bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852208c0 INFO: task kworker/0:456:4601 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9a1a5000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:457:4603 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:457 state:D stack:0 pid:4603 tgid:4603 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1c5d84 r8:00000002 r7:60000113 r6:eb1c5d8c r5:85376000 r4:85376000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85376000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522b140 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85376000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead05000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538778c r4:85387400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538778c r4:8523a580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85376000 r8:8523a5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523a580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523a580 r8:80287e08 r7:eb1bde60 r6:85235600 r5:85376000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c5fb0 to 0xeb1c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8522b380 INFO: task kworker/0:457:4603 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9a1a5000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:458:4605 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:458 state:D stack:0 pid:4605 tgid:4605 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1cdd84 r8:00000002 r7:60000113 r6:eb1cdd8c r5:85372400 r4:85372400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85372400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1cde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524e280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85372400 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead89000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85387f8c r4:85387c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85387f8c r4:8523a600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85372400 r8:8523a62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523a600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523a600 r8:80287e08 r7:eb1c5e60 r6:85235680 r5:85372400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1cdfb0 to 0xeb1cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8522b380 INFO: task kworker/0:458:4605 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9a6ba000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:459:4606 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:459 state:D stack:0 pid:4606 tgid:4606 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1d1d84 r8:00000002 r7:60000113 r6:eb1d1d8c r5:85375400 r4:85375400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85375400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524e100 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85375400 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead4d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85387b8c r4:85387800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85387b8c r4:8523a680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85375400 r8:8523a6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523a680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523a680 r8:80287e08 r7:eb1cde60 r6:85235700 r5:85375400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1d1fb0 to 0xeb1d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85228e00 INFO: task kworker/0:459:4606 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9a6ba000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:460:4608 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:460 state:D stack:0 pid:4608 tgid:4608 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1d9d84 r8:00000002 r7:60000113 r6:eb1d9d8c r5:85376c00 r4:85376c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85376c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524e7c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85376c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa3b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85388f8c r4:85388c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85388f8c r4:8523a700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85376c00 r8:8523a72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523a700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523a700 r8:80287e08 r7:eb1cde60 r6:85235780 r5:85376c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1d9fb0 to 0xeb1d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8524e1c0 INFO: task kworker/0:460:4608 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9ad52000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:461:4610 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:461 state:D stack:0 pid:4610 tgid:4610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1e5d84 r8:00000002 r7:60000113 r6:eb1e5d8c r5:85378c00 r4:85378c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85378c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524e400 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85378c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538838c r4:85388000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538838c r4:8523a780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85378c00 r8:8523a7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523a780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523a780 r8:80287e08 r7:eb1d9e60 r6:85235800 r5:85378c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e5fb0 to 0xeb1e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8524e080 INFO: task kworker/0:461:4610 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9ad52000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:462:4612 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:462 state:D stack:0 pid:4612 tgid:4612 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1edd84 r8:00000002 r7:60000113 r6:eb1edd8c r5:85378000 r4:85378000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85378000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1ede08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524e540 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85378000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeaf000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538878c r4:85388400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538878c r4:8523a800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85378000 r8:8523a82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523a800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523a800 r8:80287e08 r7:eb1d9e60 r6:85235880 r5:85378000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1edfb0 to 0xeb1edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8524e200 INFO: task kworker/0:462:4612 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9b265000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:463:4614 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:463 state:D stack:0 pid:4614 tgid:4614 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafedd84 r8:00000002 r7:60000113 r6:eafedd8c r5:8537b000 r4:8537b000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8537b000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafede08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524e680 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8537b000 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9e9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85388b8c r4:85388800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85388b8c r4:8523a880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8537b000 r8:8523a8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523a880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523a880 r8:80287e08 r7:eb1d9e60 r6:85235900 r5:8537b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafedfb0 to 0xeafedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8524e5c0 INFO: task kworker/0:463:4614 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9b9ab000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:464:4616 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:464 state:D stack:0 pid:4616 tgid:4616 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb045d84 r8:00000002 r7:60000113 r6:eb045d8c r5:8537a400 r4:8537a400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8537a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb045e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85249e40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8537a400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0573000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538ab8c r4:8538a800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538ab8c r4:8523a900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8537a400 r8:8523a92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523a900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523a900 r8:80287e08 r7:eb1d9e60 r6:85235980 r5:8537a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb045fb0 to 0xeb045ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8524e500 INFO: task kworker/0:464:4616 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9b9ab000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:465:4618 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:465 state:D stack:0 pid:4618 tgid:4618 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb065d84 r8:00000002 r7:60000113 r6:eb065d8c r5:85379800 r4:85379800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85379800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb065e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524e8c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85379800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd81000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538938c r4:85389000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538938c r4:8523a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85379800 r8:8523a9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523a980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523a980 r8:80287e08 r7:eb045e60 r6:85235a00 r5:85379800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb065fb0 to 0xeb065ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8524e800 INFO: task kworker/0:465:4618 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9bf1e000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:466:4620 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:466 state:D stack:0 pid:4620 tgid:4620 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb07dd84 r8:00000002 r7:60000113 r6:eb07dd8c r5:8537d400 r4:8537d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8537d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb07de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524ea40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8537d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfead000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538978c r4:85389400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538978c r4:8523aa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8537d400 r8:8523aa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523aa00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523aa00 r8:80287e08 r7:eb045e60 r6:85235a80 r5:8537d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb07dfb0 to 0xeb07dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8524e6c0 INFO: task kworker/0:466:4620 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9bf1e000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:467:4622 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:467 state:D stack:0 pid:4622 tgid:4622 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb091d84 r8:00000002 r7:600f0013 r6:eb091d8c r5:8537c800 r4:8537c800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8537c800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb091e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524ebc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8537c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0079000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85389b8c r4:85389800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85389b8c r4:8523aa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8537c800 r8:8523aaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523aa80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523aa80 r8:80287e08 r7:eb045e60 r6:85235b00 r5:8537c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb091fb0 to 0xeb091ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8524e980 INFO: task kworker/0:467:4622 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9c049000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:468:4624 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:468 state:D stack:0 pid:4624 tgid:4624 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0add84 r8:00000002 r7:60000113 r6:eb0add8c r5:8537bc00 r4:8537bc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8537bc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ade08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524ecc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8537bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85389f8c r4:85389c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85389f8c r4:8523ab00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8537bc00 r8:8523ab2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523ab00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523ab00 r8:80287e08 r7:eb045e60 r6:85235b80 r5:8537bc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0adfb0 to 0xeb0adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8524e9c0 INFO: task kworker/0:468:4624 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9c618000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:469:4626 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:469 state:D stack:0 pid:4626 tgid:4626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0bdd84 r8:00000002 r7:60000013 r6:eb0bdd8c r5:8537e000 r4:8537e000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8537e000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0bde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524ee00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8537e000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0131000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538a38c r4:8538a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538a38c r4:8523ab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8537e000 r8:8523abac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523ab80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523ab80 r8:80287e08 r7:eb045e60 r6:85235c00 r5:8537e000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0bdfb0 to 0xeb0bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8524eac0 INFO: task kworker/0:469:4626 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9ca42000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:470:4628 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:470 state:D stack:0 pid:4628 tgid:4628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0d9d84 r8:00000002 r7:60000013 r6:eb0d9d8c r5:8537ec00 r4:8537ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8537ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524ef40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8537ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e053b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538a78c r4:8538a400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538a78c r4:8523ac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8537ec00 r8:8523ac2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523ac00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523ac00 r8:80287e08 r7:eb045e60 r6:85235c80 r5:8537ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d9fb0 to 0xeb0d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8524eac0 INFO: task kworker/0:470:4628 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9ca42000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:471:4631 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:471 state:D stack:0 pid:4631 tgid:4631 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0f1d84 r8:00000002 r7:60000113 r6:eb0f1d8c r5:853b8c00 r4:853b8c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853b8c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bf040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea949000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538b38c r4:8538b000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538b38c r4:8523ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853b8c00 r8:8523acac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523ac80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523ac80 r8:80287e08 r7:eb045e60 r6:85235d00 r5:853b8c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f1fb0 to 0xeb0f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85249cc0 INFO: task kworker/0:471:4631 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9ca42000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:472:4632 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:472 state:D stack:0 pid:4632 tgid:4632 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0fdd84 r8:00000002 r7:60000013 r6:eb0fdd8c r5:853b9800 r4:853b9800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853b9800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0fde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524ef80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e481f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538af8c r4:8538ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538af8c r4:8523ad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853b9800 r8:8523ad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523ad00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523ad00 r8:80287e08 r7:eb0f1e60 r6:85235d80 r5:853b9800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0fdfb0 to 0xeb0fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85249cc0 INFO: task kworker/0:472:4632 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9ca42000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb109d84 r8:00000002 r7:60000013 r6:eb109d8c r5:853ba400 r4:853ba400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ba400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb109e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bf300 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea979000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538b78c r4:8538b400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538b78c r4:8523ad80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ba400 r8:8523adac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523ad80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523ad80 r8:80287e08 r7:eb0f1e60 r6:85235e00 r5:853ba400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb109fb0 to 0xeb109ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8524efc0 INFO: task kworker/0:473:4633 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9ce78000 ed6eb000 00000001 80239b98 7f047000 00000001 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:dffe1dc0 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:474 state:D stack:0 pid:4638 tgid:4638 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0e5d84 r8:00000002 r7:60000013 r6:eb0e5d8c r5:8536ec00 r4:8536ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8536ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bf3c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8536ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac1b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538bb8c r4:8538b800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538bb8c r4:8523ae00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8536ec00 r8:8523ae2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523ae00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523ae00 r8:80287e08 r7:eb109e60 r6:8523ae80 r5:8536ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e5fb0 to 0xeb0e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:852bf440 Exception stack(0xdffe1d28 to 0xdffe1d70) r4:00000000 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bf980 r10:61c88647 r9:84819800 r8:8523af2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d1e08 r5:8538bf8c r4:8538bc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Not tainted 6.15.0-rc5-syzkaller #0 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb139e08 r5:8538f78c r4:8538f400 r4:00000001 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9d661000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:477:4646 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:477 state:D stack:0 pid:4646 tgid:4646 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1f5d84 r8:00000002 r7:60000013 r6:eb1f5d8c r5:848e2400 r4:848e2400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e2400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f5e08 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bf900 r10:61c88647 r9:848e2400 r8:852bd1ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f5fb0 to 0xeb1f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852bf900 INFO: task kworker/0:477:4646 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9dae2000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:848d9e00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f9e08 r5:8538cf8c r4:8538cc00 r4:852bd280 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xdffe1d28 to 0xdffe1d70) r4:dffe1dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:479:4650 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:479 state:D stack:0 pid:4650 tgid:4650 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb12dd84 r8:00000002 r7:60000013 r6:eb12dd8c r5:848e0000 r4:848e0000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:848e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r5:8538cb8c r4:8538c800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848e0000 r8:852bd3ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:852bfc00 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:480:4652 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:480 state:D stack:0 pid:4652 tgid:4652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0cdd84 r8:00000002 r7:60000113 r6:eb0cdd8c r5:848e3c00 r4:848e3c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e3c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0cde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b9040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:848e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8538d78c r4:8538d400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848e3c00 r8:852bd4ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:852bd480 r8:80287e08 r7:eb1f9e60 r6:852bd500 r5:848e3c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0cdfb0 to 0xeb0cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852bffc0 INFO: task kworker/0:480:4652 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9e224000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:848e4800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bf640 r5:8538d38c r4:8538d000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:852bd580 r8:80287e08 r7:eb0cde60 r6:852bd600 r5:848e4800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:482:4655 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:482 state:D stack:0 pid:4655 tgid:4655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb201d84 r8:00000002 r7:60000013 r6:eb201d8c r5:848e6000 r4:848e6000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e6000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb201e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b95c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8538df8c r4:8538dc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9e8ac000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8538db8c r4:8538d800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848e6c00 r8:852bd7ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:483:4658 is blocked on a mutex likely owned by task kworker/0:115:3602. r4:00000000 Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9e8ac000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:484:4661 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:484 state:D stack:0 pid:4661 tgid:4661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb205d84 r8:00000002 r7:60000113 r6:eb205d8c r5:848e5400 r4:848e5400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e5400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb205e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b9700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:848e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf09000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538e38c r4:8538e000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538e38c r4:852bd880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e5400 r8:852bd8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852bd880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bd880 r8:80287e08 r7:eb201e60 r6:852bd900 r5:848e5400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb205fb0 to 0xeb205ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852b9440 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 Exception stack(0xdffe1fb0 to 0xdffe1ff8) Workqueue: events bpf_prog_free_deferred r4:00000000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:852bd980 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xdffe1d28 to 0xdffe1d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 Workqueue: events bpf_prog_free_deferred [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b9d40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85280000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf79000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538ef8c r4:8538ec00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538ef8c r4:852bda80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85280000 r8:852bdaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852bda80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bda80 r8:80287e08 r7:eb209e60 r6:852bdb00 r5:85280000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb211fb0 to 0xeb211ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852b9880 INFO: task kworker/0:486:4664 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9eca9000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8538eb8c r4:8538e800 r10:61c88647 r9:85280c00 r8:852bdbac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9f316000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 Workqueue: events bpf_prog_free_deferred [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8538f38c r4:8538f000 r10:61c88647 r9:85283000 r8:852bdcac r7:82804d40 r6:dddced80 r5:dddceda0 Call trace: 1d60: 80230ad0 80239bb0 80070013 ffffffff [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xdffe1fb0 to 0xdffe1ff8) task:kworker/0:489 state:D stack:0 pid:4669 tgid:4669 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eafcb000 r5:8538fb8c r4:8538f800 r10:00000000 r9:852bdd80 r8:80287e08 r7:eb219e60 r6:852bde00 r5:85281800 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9f571000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8538ff8c r4:8538fc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb22de08 r5:8539838c r4:85398000 r10:61c88647 r9:85285400 r8:852bdfac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:00000000 r9:83018005 r8:85286000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 r7:dddced80 r6:83018000 r5:85399b8c r4:852c0080 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 task:kworker/0:493 state:D stack:0 pid:4678 tgid:4678 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c5800 r5:8539878c r4:85398400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539878c r4:852c0180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85286c00 r8:852c01ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c0180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c0180 r8:80287e08 r7:eb231e60 r6:852c0200 r5:85286c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb235fb0 to 0xeb235ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852c5700 INFO: task kworker/0:493:4678 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 9fa98000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r4:00000000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/1:288:4680 blocked for more than 461 seconds. r4:00000000 r9:83018205 r8:85283c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/1:288:4680 is blocked on a mutex likely owned by task kworker/0:115:3602. r4:82ac21e4 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:494:4681 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:494 state:D stack:0 pid:4681 tgid:4681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb23dd84 r8:00000002 r7:60000013 r6:eb23dd8c r5:8470ec00 r4:8470ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8470ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb23de08 r4:00000000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8539938c r4:85399000 r10:61c88647 r9:8470ec00 r8:852c032c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/1:289:4684 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:289 state:D stack:0 pid:4684 tgid:4684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb249d84 r8:00000002 r7:60000113 r6:eb249d8c r5:84b10000 r4:84b10000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b10000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb249e08 r4:00000000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8442bb8c r4:8442b800 r4:85235f80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:80070013 r4:80239bb0 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:85327b8c r4:85327800 r10:61c88647 r9:84b11800 r8:852c402c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:290:4685 is blocked on a mutex likely owned by task kworker/0:115:3602. r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a039f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:495:4687 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:495 state:D stack:0 pid:4687 tgid:4687 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:84b12400 r4:00000000 r5:00001000 r4:eb0b9000 r5:8539978c r4:85399400 r4:852c0500 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:496:4691 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:496 state:D stack:0 pid:4691 tgid:4691 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb225d84 r8:00000002 r7:60000013 r6:eb225d8c r5:84b13000 r4:84b13000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b13000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb225e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b6480 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b13000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb135000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539a38c r4:8539a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539a38c r4:852c0600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b13000 r8:852c062c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c0600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c0600 r8:80287e08 r7:eb231e60 r6:852c0680 r5:84b13000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb225fb0 to 0xeb225ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852b61c0 INFO: task kworker/0:496:4691 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a0a40000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:497:4692 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:497 state:D stack:0 pid:4692 tgid:4692 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb251d84 r8:00000002 r7:60000013 r6:eb251d8c r5:84b13c00 r4:84b13c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b13c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb251e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b6280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b13c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb105000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85399f8c r4:85399c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85399f8c r4:852c0700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b13c00 r8:852c072c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c0700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c0700 r8:80287e08 r7:eb225e60 r6:852c0780 r5:84b13c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb251fb0 to 0xeb251ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852b61c0 INFO: task kworker/0:497:4692 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a0a81000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:498:4694 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:498 state:D stack:0 pid:4694 tgid:4694 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb255d84 r8:00000002 r7:60000013 r6:eb255d8c r5:84b14800 r4:84b14800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b14800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb255e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b6900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b14800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb27d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539af8c r4:8539ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539af8c r4:852c0800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b14800 r8:852c082c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c0800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c0800 r8:80287e08 r7:eb225e60 r6:852c0880 r5:84b14800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb255fb0 to 0xeb255ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852b6300 INFO: task kworker/0:498:4694 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a0dce000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:499:4695 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:499 state:D stack:0 pid:4695 tgid:4695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb215d84 r8:00000002 r7:60000013 r6:eb215d8c r5:84b15400 r4:84b15400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b15400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb215e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b6680 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b15400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1db000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539a78c r4:8539a400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539a78c r4:852c0900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b15400 r8:852c092c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c0900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c0900 r8:80287e08 r7:eb255e60 r6:852c0980 r5:84b15400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb215fb0 to 0xeb215ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852b6440 INFO: task kworker/0:499:4695 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a0fcf000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:500:4698 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:500 state:D stack:0 pid:4698 tgid:4698 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb289d84 r8:00000002 r7:60000113 r6:eb289d8c r5:853bbc00 r4:853bbc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853bbc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb289e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b67c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb261000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539ab8c r4:8539a800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539ab8c r4:852c0a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853bbc00 r8:852c0a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c0a00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c0a00 r8:80287e08 r7:eb255e60 r6:852c4080 r5:853bbc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb289fb0 to 0xeb289ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852b6700 INFO: task kworker/0:500:4698 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1157000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:501:4700 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:501 state:D stack:0 pid:4700 tgid:4700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb155d84 r8:00000002 r7:60000113 r6:eb155d8c r5:853be000 r4:853be000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853be000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb155e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b84c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853be000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05f1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a078c r4:853a0400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a078c r4:852c0a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853be000 r8:852c0aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c0a80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c0a80 r8:80287e08 r7:eb255e60 r6:852c4100 r5:853be000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb155fb0 to 0xeb155ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852b6780 INFO: task kworker/0:501:4700 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a131e000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:502:4701 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:502 state:D stack:0 pid:4701 tgid:4701 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb16dd84 r8:00000002 r7:60000113 r6:eb16dd8c r5:853bb000 r4:853bb000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853bb000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb16de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b6a00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa2f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539b38c r4:8539b000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539b38c r4:852c0b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853bb000 r8:852c0b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c0b00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c0b00 r8:80287e08 r7:eb155e60 r6:852c4180 r5:853bb000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb16dfb0 to 0xeb16dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852b6940 INFO: task kworker/0:502:4701 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a14f7000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:503:4703 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:503 state:D stack:0 pid:4703 tgid:4703 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb29dd84 r8:00000002 r7:60000113 r6:eb29dd8c r5:853bc800 r4:853bc800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853bc800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb29de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b6bc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc09000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539b78c r4:8539b400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539b78c r4:852c0b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853bc800 r8:852c0bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c0b80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c0b80 r8:80287e08 r7:eb155e60 r6:852c4200 r5:853bc800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb29dfb0 to 0xeb29dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852b6800 INFO: task kworker/0:503:4703 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1892000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:504:4705 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:504 state:D stack:0 pid:4705 tgid:4705 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2add84 r8:00000002 r7:60000113 r6:eb2add8c r5:853b8000 r4:853b8000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853b8000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ade08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b6cc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd2f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539bb8c r4:8539b800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539bb8c r4:852c0c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853b8000 r8:852c0c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c0c00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c0c00 r8:80287e08 r7:eb155e60 r6:852c4280 r5:853b8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2adfb0 to 0xeb2adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852b6a40 INFO: task kworker/0:504:4705 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1a8c000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:505:4707 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:505 state:D stack:0 pid:4707 tgid:4707 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2b5d84 r8:00000002 r7:60000113 r6:eb2b5d8c r5:853bec00 r4:853bec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853bec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b6e00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff55000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539bf8c r4:8539bc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539bf8c r4:852c0c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853bec00 r8:852c0cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c0c80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c0c80 r8:80287e08 r7:eb155e60 r6:852c4300 r5:853bec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b5fb0 to 0xeb2b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852b6a40 INFO: task kworker/0:505:4707 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1a8c000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:506:4709 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:506 state:D stack:0 pid:4709 tgid:4709 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb259d84 r8:00000002 r7:60000113 r6:eb259d8c r5:84b16000 r4:84b16000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b16000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb259e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b6f40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b16000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05a7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a038c r4:853a0000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a038c r4:852c0d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b16000 r8:852c0d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c0d00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c0d00 r8:80287e08 r7:eb155e60 r6:852c0d80 r5:84b16000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb259fb0 to 0xeb259ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852b6c80 INFO: task kworker/0:506:4709 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a264c000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:507:4712 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:507 state:D stack:0 pid:4712 tgid:4712 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2bdd84 r8:00000002 r7:60000113 r6:eb2bdd8c r5:84b16c00 r4:84b16c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b16c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2bde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b6dc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b16c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06b7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a0b8c r4:853a0800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a0b8c r4:852c0e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b16c00 r8:852c0e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c0e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c0e00 r8:80287e08 r7:eb155e60 r6:852c0e80 r5:84b16c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2bdfb0 to 0xeb2bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852b8b80 INFO: task kworker/0:507:4712 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a264c000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:508:4715 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:508 state:D stack:0 pid:4715 tgid:4715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2c5d84 r8:00000002 r7:60000113 r6:eb2c5d8c r5:84b10c00 r4:84b10c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b10c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e10c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b10c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0721000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a0f8c r4:853a0c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a0f8c r4:852c0f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b10c00 r8:852c0f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c0f00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c0f00 r8:80287e08 r7:eb2bde60 r6:852c0f80 r5:84b10c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c5fb0 to 0xeb2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852e1000 INFO: task kworker/0:508:4715 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a264c000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:509:4716 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:509 state:D stack:0 pid:4716 tgid:4716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2c9d84 r8:00000002 r7:60000113 r6:eb2c9d8c r5:85282400 r4:85282400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85282400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e14c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85282400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa19000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a178c r4:853a1400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a178c r4:852db000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85282400 r8:852db02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852db000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852db000 r8:80287e08 r7:eb2c5e60 r6:852db080 r5:85282400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c9fb0 to 0xeb2c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852e1240 INFO: task kworker/0:509:4716 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a264c000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:510:4718 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:510 state:D stack:0 pid:4718 tgid:4718 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2cdd84 r8:00000002 r7:60000013 r6:eb2cdd8c r5:853f0000 r4:853f0000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f0000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2cde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e1300 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07b5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a138c r4:853a1000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a138c r4:852db100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f0000 r8:852db12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852db100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852db100 r8:80287e08 r7:eb2c9e60 r6:852db180 r5:853f0000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2cdfb0 to 0xeb2cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852e1180 INFO: task kworker/0:510:4718 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a2e36000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:511:4721 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:511 state:D stack:0 pid:4721 tgid:4721 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2d1d84 r8:00000002 r7:60000013 r6:eb2d1d8c r5:853f0c00 r4:853f0c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f0c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e1640 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa6f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a1b8c r4:853a1800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a1b8c r4:852db200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f0c00 r8:852db22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852db200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852db200 r8:80287e08 r7:eb2c9e60 r6:852db280 r5:853f0c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d1fb0 to 0xeb2d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852e1340 INFO: task kworker/0:511:4721 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a3181000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:512:4722 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:512 state:D stack:0 pid:4722 tgid:4722 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2d5d84 r8:00000002 r7:60000013 r6:eb2d5d8c r5:853f1800 r4:853f1800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f1800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e1800 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa91000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a1f8c r4:853a1c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a1f8c r4:852db300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f1800 r8:852db32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852db300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852db300 r8:80287e08 r7:eb2d1e60 r6:852db380 r5:853f1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d5fb0 to 0xeb2d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852e13c0 INFO: task kworker/0:512:4722 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a35bd000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:513:4724 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:513 state:D stack:0 pid:4724 tgid:4724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2d9d84 r8:00000002 r7:60000113 r6:eb2d9d8c r5:853f2400 r4:853f2400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f2400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e1940 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaac7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a238c r4:853a2000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a238c r4:852db400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f2400 r8:852db42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852db400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852db400 r8:80287e08 r7:eb2d5e60 r6:852db480 r5:853f2400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d9fb0 to 0xeb2d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852e1680 INFO: task kworker/0:513:4724 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a35bd000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:514:4726 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:514 state:D stack:0 pid:4726 tgid:4726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2ddd84 r8:00000002 r7:60000113 r6:eb2ddd8c r5:853f3000 r4:853f3000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f3000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2dde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e1ac0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaafb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a278c r4:853a2400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a278c r4:852db500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f3000 r8:852db52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852db500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852db500 r8:80287e08 r7:eb2d9e60 r6:852db580 r5:853f3000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2ddfb0 to 0xeb2ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852e17c0 INFO: task kworker/0:514:4726 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a37b2000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:515:4728 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:515 state:D stack:0 pid:4728 tgid:4728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2e1d84 r8:00000002 r7:60000113 r6:eb2e1d8c r5:853f4800 r4:853f4800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f4800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e1f00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab6b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a2f8c r4:853a2c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a2f8c r4:852db600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f4800 r8:852db62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852db600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852db600 r8:80287e08 r7:eb2dde60 r6:852db680 r5:853f4800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e1fb0 to 0xeb2e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852e18c0 INFO: task kworker/0:515:4728 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a409b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:516:4730 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:516 state:D stack:0 pid:4730 tgid:4730 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2e5d84 r8:00000002 r7:60000013 r6:eb2e5d8c r5:853f6000 r4:853f6000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f6000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e1d00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab23000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a2b8c r4:853a2800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a2b8c r4:852db700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f6000 r8:852db72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852db700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852db700 r8:80287e08 r7:eb2e1e60 r6:852db780 r5:853f6000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e5fb0 to 0xeb2e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852e1c00 INFO: task kworker/0:516:4730 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a409b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:517:4732 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:517 state:D stack:0 pid:4732 tgid:4732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2e9d84 r8:00000002 r7:60000113 r6:eb2e9d8c r5:853f6c00 r4:853f6c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f6c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b6ec0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab89000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a338c r4:853a3000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a338c r4:852db800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f6c00 r8:852db82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852db800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852db800 r8:80287e08 r7:eb2e1e60 r6:852c4380 r5:853f6c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e9fb0 to 0xeb2e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852e1c00 INFO: task kworker/0:517:4732 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a409b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:518:4734 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:518 state:D stack:0 pid:4734 tgid:4734 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2f1d84 r8:00000002 r7:60000113 r6:eb2f1d8c r5:853c1800 r4:853c1800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c1800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f0540 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead0d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a3f8c r4:853a3c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a3f8c r4:852db880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c1800 r8:852db8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852db880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852db880 r8:80287e08 r7:eb2e9e60 r6:852c4400 r5:853c1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f1fb0 to 0xeb2f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852f0000 INFO: task kworker/0:518:4734 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a409b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:519:4736 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:519 state:D stack:0 pid:4736 tgid:4736 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2f5d84 r8:00000002 r7:60000013 r6:eb2f5d8c r5:853c2400 r4:853c2400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c2400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f0040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabc3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a378c r4:853a3400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a378c r4:852db900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c2400 r8:852db92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852db900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852db900 r8:80287e08 r7:eb2f1e60 r6:852c4480 r5:853c2400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f5fb0 to 0xeb2f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852f0140 INFO: task kworker/0:519:4736 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a4977000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:520:4738 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:520 state:D stack:0 pid:4738 tgid:4738 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2f9d84 r8:00000002 r7:60000013 r6:eb2f9d8c r5:853c3000 r4:853c3000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c3000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f0380 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a3b8c r4:853a3800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a3b8c r4:852db980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c3000 r8:852db9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852db980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852db980 r8:80287e08 r7:eb2f1e60 r6:852c4500 r5:853c3000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f9fb0 to 0xeb2f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852f0200 INFO: task kworker/0:520:4738 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a4977000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:521:4740 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:521 state:D stack:0 pid:4740 tgid:4740 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2fdd84 r8:00000002 r7:60000113 r6:eb2fdd8c r5:853c3c00 r4:853c3c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c3c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2fde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f0880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853acb8c r4:853ac800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853acb8c r4:852dba00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c3c00 r8:852dba2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852dba00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852dba00 r8:80287e08 r7:eb2f1e60 r6:852c4580 r5:853c3c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2fdfb0 to 0xeb2fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852f03c0 INFO: task kworker/0:521:4740 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a4c82000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:522:4742 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:522 state:D stack:0 pid:4742 tgid:4742 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb301d84 r8:00000002 r7:60000113 r6:eb301d8c r5:853c4800 r4:853c4800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c4800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb301e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f0600 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead87000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853ac38c r4:853ac000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ac38c r4:852dba80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c4800 r8:852dbaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852dba80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852dba80 r8:80287e08 r7:eb2fde60 r6:852c4600 r5:853c4800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb301fb0 to 0xeb301ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852f0480 INFO: task kworker/0:522:4742 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a521d000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:523:4744 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:523 state:D stack:0 pid:4744 tgid:4744 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb265d84 r8:00000002 r7:60000113 r6:eb265d8c r5:853f5400 r4:853f5400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f5400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb265e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f0740 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853ac78c r4:853ac400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ac78c r4:852dbb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f5400 r8:852dbb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852dbb00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852dbb00 r8:80287e08 r7:eb2fde60 r6:852dbb80 r5:853f5400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb265fb0 to 0xeb265ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852f0680 INFO: task kworker/0:523:4744 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a521d000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:524:4746 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:524 state:D stack:0 pid:4746 tgid:4746 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb305d84 r8:00000002 r7:60000113 r6:eb305d8c r5:853f3c00 r4:853f3c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f3c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb305e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f0a00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf6f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853acf8c r4:853acc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853acf8c r4:852dbc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f3c00 r8:852dbc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852dbc00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852dbc00 r8:80287e08 r7:eb2fde60 r6:852dbc80 r5:853f3c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb305fb0 to 0xeb305ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852f07c0 INFO: task kworker/0:524:4746 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a5561000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:525:4749 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:525 state:D stack:0 pid:4749 tgid:4749 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb309d84 r8:00000002 r7:60000113 r6:eb309d8c r5:848b0000 r4:848b0000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848b0000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb309e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f0b40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:848b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf93000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853ad38c r4:853ad000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ad38c r4:852dbd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848b0000 r8:852dbd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852dbd00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852dbd00 r8:80287e08 r7:eb305e60 r6:852dbd80 r5:848b0000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb309fb0 to 0xeb309ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852f0800 INFO: task kworker/0:525:4749 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a5561000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:526:4750 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:526 state:D stack:0 pid:4750 tgid:4750 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb30dd84 r8:00000002 r7:60000113 r6:eb30dd8c r5:848b0c00 r4:848b0c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848b0c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb30de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f0d00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:848b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb15f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853ad78c r4:853ad400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ad78c r4:852dbe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848b0c00 r8:852dbe2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852dbe00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852dbe00 r8:80287e08 r7:eb309e60 r6:852dbe80 r5:848b0c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb30dfb0 to 0xeb30dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852f09c0 INFO: task kworker/0:526:4750 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a598d000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:527:4753 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:527 state:D stack:0 pid:4753 tgid:4753 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb311d84 r8:00000002 r7:60000113 r6:eb311d8c r5:848b1800 r4:848b1800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848b1800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb311e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f0e40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:848b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb17b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853adb8c r4:853ad800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853adb8c r4:852dbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848b1800 r8:852dbf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852dbf00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852dbf00 r8:80287e08 r7:eb30de60 r6:852dbf80 r5:848b1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb311fb0 to 0xeb311ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852f0b80 INFO: task kworker/0:527:4753 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a598d000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:528:4754 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:528 state:D stack:0 pid:4754 tgid:4754 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2edd84 r8:00000002 r7:60000113 r6:eb2edd8c r5:848b2400 r4:848b2400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848b2400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ede08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fe0c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:848b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1a3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853ae38c r4:853ae000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ae38c r4:852fa000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848b2400 r8:852fa02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852fa000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852fa000 r8:80287e08 r7:eb311e60 r6:852fa080 r5:848b2400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2edfb0 to 0xeb2edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852f0cc0 INFO: task kworker/0:528:4754 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a6074000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:529:4755 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:529 state:D stack:0 pid:4755 tgid:4755 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb315d84 r8:00000002 r7:60000013 r6:eb315d8c r5:848b3000 r4:848b3000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848b3000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb315e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f0200 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:848b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb18b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853adf8c r4:853adc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853adf8c r4:852fa100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848b3000 r8:852fa12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852fa100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852fa100 r8:80287e08 r7:eb2ede60 r6:852fa180 r5:848b3000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb315fb0 to 0xeb315ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852f0cc0 INFO: task kworker/0:529:4755 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a6074000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:530:4759 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:530 state:D stack:0 pid:4759 tgid:4759 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb319d84 r8:00000002 r7:60000013 r6:eb319d8c r5:848b3c00 r4:848b3c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848b3c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb319e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fe280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:848b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853ae78c r4:853ae400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ae78c r4:852fa200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848b3c00 r8:852fa22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852fa200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852fa200 r8:80287e08 r7:eb2ede60 r6:852fa280 r5:848b3c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb319fb0 to 0xeb319ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852fe1c0 INFO: task kworker/0:530:4759 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a64ed000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:531:4760 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:531 state:D stack:0 pid:4760 tgid:4760 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb321d84 r8:00000002 r7:60000113 r6:eb321d8c r5:848b4800 r4:848b4800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848b4800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb321e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fe8c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:848b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb341000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853af78c r4:853af400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853af78c r4:852fa300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848b4800 r8:852fa32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852fa300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852fa300 r8:80287e08 r7:eb319e60 r6:852fa380 r5:848b4800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb321fb0 to 0xeb321ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852fe100 INFO: task kworker/0:531:4760 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a64ed000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:532:4761 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:532 state:D stack:0 pid:4761 tgid:4761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb31dd84 r8:00000002 r7:60000013 r6:eb31dd8c r5:848b5400 r4:848b5400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848b5400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb31de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fe440 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:848b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb291000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853aeb8c r4:853ae800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853aeb8c r4:852fa400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848b5400 r8:852fa42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852fa400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852fa400 r8:80287e08 r7:eb321e60 r6:852fa480 r5:848b5400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb31dfb0 to 0xeb31dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852fe100 INFO: task kworker/0:532:4761 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a6669000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:533:4764 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:533 state:D stack:0 pid:4764 tgid:4764 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb325d84 r8:00000002 r7:60000113 r6:eb325d8c r5:848b6000 r4:848b6000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848b6000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb325e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fe640 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:848b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb329000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853aef8c r4:853aec00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853aef8c r4:852fa500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848b6000 r8:852fa52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852fa500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852fa500 r8:80287e08 r7:eb321e60 r6:852fa580 r5:848b6000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb325fb0 to 0xeb325ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852fe4c0 INFO: task kworker/0:533:4764 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a6669000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:534:4766 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:534 state:D stack:0 pid:4766 tgid:4766 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb339d84 r8:00000002 r7:60000013 r6:eb339d8c r5:848b6c00 r4:848b6c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848b6c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb339e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fe780 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:848b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb335000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853af38c r4:853af000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853af38c r4:852fa600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848b6c00 r8:852fa62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852fa600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852fa600 r8:80287e08 r7:eb321e60 r6:852fa680 r5:848b6c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb339fb0 to 0xeb339ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852fe600 INFO: task kworker/0:534:4766 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a693e000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:535:4768 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:535 state:D stack:0 pid:4768 tgid:4768 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb32dd84 r8:00000002 r7:60000013 r6:eb32dd8c r5:84a40000 r4:84a40000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a40000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb32de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fec00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a40000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb359000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853aff8c r4:853afc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853aff8c r4:852fa700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a40000 r8:852fa72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852fa700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852fa700 r8:80287e08 r7:eb321e60 r6:852fa780 r5:84a40000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb32dfb0 to 0xeb32dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852fe600 INFO: task kworker/0:535:4768 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a716f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:536:4770 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:536 state:D stack:0 pid:4770 tgid:4770 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb345d84 r8:00000002 r7:60000013 r6:eb345d8c r5:84a40c00 r4:84a40c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a40c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb345e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fea80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a40c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb34d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853afb8c r4:853af800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853afb8c r4:852fa800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a40c00 r8:852fa82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852fa800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852fa800 r8:80287e08 r7:eb32de60 r6:852fa880 r5:84a40c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb345fb0 to 0xeb345ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852fe940 INFO: task kworker/0:536:4770 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a716f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:537:4772 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:537 state:D stack:0 pid:4772 tgid:4772 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb351d84 r8:00000002 r7:60000113 r6:eb351d8c r5:84a42400 r4:84a42400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a42400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb351e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fee00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a42400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb369000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b438c r4:853b4000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b438c r4:852fa900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a42400 r8:852fa92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852fa900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852fa900 r8:80287e08 r7:eb32de60 r6:852fa980 r5:84a42400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb351fb0 to 0xeb351ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852fea00 INFO: task kworker/0:537:4772 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a716f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:538:4773 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:538 state:D stack:0 pid:4773 tgid:4773 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb375d84 r8:00000002 r7:60000113 r6:eb375d8c r5:84a43c00 r4:84a43c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a43c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb375e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546c100 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a43c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb37d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b4b8c r4:853b4800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b4b8c r4:852faa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a43c00 r8:852faa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852faa00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852faa00 r8:80287e08 r7:eb351e60 r6:852faa80 r5:84a43c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb375fb0 to 0xeb375ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852feb00 INFO: task kworker/0:538:4773 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a753b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:539:4775 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:539 state:D stack:0 pid:4775 tgid:4775 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb35dd84 r8:00000002 r7:60000013 r6:eb35dd8c r5:84a41800 r4:84a41800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a41800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb35de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fefc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a41800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb371000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b478c r4:853b4400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b478c r4:852fab00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a41800 r8:852fab2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852fab00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852fab00 r8:80287e08 r7:eb375e60 r6:852fab80 r5:84a41800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb35dfb0 to 0xeb35dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:852fedc0 INFO: task kworker/0:539:4775 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a753b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:540:4777 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:540 state:D stack:0 pid:4777 tgid:4777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb38dd84 r8:00000002 r7:60000013 r6:eb38dd8c r5:853c6000 r4:853c6000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c6000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb38de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546c340 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb389000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b4f8c r4:853b4c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b4f8c r4:852fac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c6000 r8:852fac2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852fac00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852fac00 r8:80287e08 r7:eb375e60 r6:852c4680 r5:853c6000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb38dfb0 to 0xeb38dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8546c0c0 INFO: task kworker/0:540:4777 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a7c60000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:541:4779 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:541 state:D stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb381d84 r8:00000002 r7:60000013 r6:eb381d8c r5:84a44800 r4:84a44800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a44800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb381e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546c4c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a44800 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb395000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b538c r4:853b5000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b538c r4:852fac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a44800 r8:852facac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852fac80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852fac80 r8:80287e08 r7:eb38de60 r6:852fad00 r5:84a44800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb381fb0 to 0xeb381ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8546c280 INFO: task kworker/0:541:4779 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a7ed5000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:542:4783 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:542 state:D stack:0 pid:4783 tgid:4783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb399d84 r8:00000002 r7:60000113 r6:eb399d8c r5:84a45400 r4:84a45400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a45400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb399e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546c5c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a45400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3a1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b578c r4:853b5400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b578c r4:852fad80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a45400 r8:852fadac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852fad80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852fad80 r8:80287e08 r7:eb381e60 r6:852fae00 r5:84a45400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb399fb0 to 0xeb399ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8546c2c0 INFO: task kworker/0:542:4783 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a7fb5000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:543:4785 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:543 state:D stack:0 pid:4785 tgid:4785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3bdd84 r8:00000002 r7:60000113 r6:eb3bdd8c r5:84a46000 r4:84a46000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a46000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3bde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546c700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a46000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3ad000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b5b8c r4:853b5800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b5b8c r4:852fae80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a46000 r8:852faeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852fae80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852fae80 r8:80287e08 r7:eb399e60 r6:852faf00 r5:84a46000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3bdfb0 to 0xeb3bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8546c3c0 INFO: task kworker/0:543:4785 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a82bc000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:544:4787 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:544 state:D stack:0 pid:4787 tgid:4787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3b1d84 r8:00000002 r7:60000013 r6:eb3b1d8c r5:84a46c00 r4:84a46c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a46c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546c880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a46c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3b9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b5f8c r4:853b5c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b5f8c r4:852faf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a46c00 r8:852fafac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852faf80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852faf80 r8:80287e08 r7:eb3bde60 r6:85472000 r5:84a46c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3b1fb0 to 0xeb3b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8546c580 INFO: task kworker/0:544:4787 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a84d4000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:545:4788 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:545 state:D stack:0 pid:4788 tgid:4788 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3a5d84 r8:00000002 r7:60000013 r6:eb3a5d8c r5:84a43000 r4:84a43000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a43000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546ca80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a43000 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ff000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b638c r4:853b6000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b638c r4:85472080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a43000 r8:854720ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472080 r8:80287e08 r7:eb3b1e60 r6:85472100 r5:84a43000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a5fb0 to 0xeb3a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8546c580 INFO: task kworker/0:545:4788 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a84d4000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:546:4790 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:546 state:D stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb055d84 r8:00000002 r7:60000113 r6:eb055d8c r5:85408c00 r4:85408c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85408c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb055e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84238300 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85408c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b6f8c r4:853b6c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b6f8c r4:85472180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85408c00 r8:854721ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472180 r8:80287e08 r7:eb3a5e60 r6:85472200 r5:85408c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb055fb0 to 0xeb055ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8546ca40 INFO: task kworker/0:546:4790 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a86ac000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:547:4792 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:547 state:D stack:0 pid:4792 tgid:4792 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb071d84 r8:00000002 r7:60000013 r6:eb071d8c r5:8540a400 r4:8540a400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb071e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546cd00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8540a400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa5f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b678c r4:853b6400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b678c r4:85472280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540a400 r8:854722ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472280 r8:80287e08 r7:eb055e60 r6:85472300 r5:8540a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb071fb0 to 0xeb071ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8546cb80 INFO: task kworker/0:547:4792 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a89c0000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:548:4793 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:548 state:D stack:0 pid:4793 tgid:4793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb081d84 r8:00000002 r7:60000113 r6:eb081d8c r5:85408000 r4:85408000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85408000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb081e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85470100 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85408000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b738c r4:853b7000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b738c r4:85472380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85408000 r8:854723ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472380 r8:80287e08 r7:eb055e60 r6:85472400 r5:85408000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb081fb0 to 0xeb081ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8546ce00 INFO: task kworker/0:548:4793 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a8cf7000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:549:4796 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:549 state:D stack:0 pid:4796 tgid:4796 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb08dd84 r8:00000002 r7:60000113 r6:eb08dd8c r5:85409800 r4:85409800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85409800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb08de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85470400 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85409800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0563000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b7b8c r4:853b7800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b7b8c r4:85472480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85409800 r8:854724ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472480 r8:80287e08 r7:eb081e60 r6:85472500 r5:85409800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb08dfb0 to 0xeb08dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84238200 INFO: task kworker/0:549:4796 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a8e34000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:550:4798 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:550 state:D stack:0 pid:4798 tgid:4798 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3c9d84 r8:00000002 r7:60000113 r6:eb3c9d8c r5:8540bc00 r4:8540bc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540bc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85470280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8540bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04ef000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b778c r4:853b7400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b778c r4:85472580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540bc00 r8:854725ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472580 r8:80287e08 r7:eb08de60 r6:85472600 r5:8540bc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c9fb0 to 0xeb3c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:854701c0 INFO: task kworker/0:550:4798 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a8fb0000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:551:4801 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:551 state:D stack:0 pid:4801 tgid:4801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb099d84 r8:00000002 r7:60000113 r6:eb099d8c r5:8540c800 r4:8540c800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540c800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb099e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854706c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8540c800 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea91b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ac38c r4:854ac000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ac38c r4:85472680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540c800 r8:854726ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472680 r8:80287e08 r7:eb08de60 r6:85472700 r5:8540c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb099fb0 to 0xeb099ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85470200 INFO: task kworker/0:551:4801 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a91b0000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:552:4803 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:552 state:D stack:0 pid:4803 tgid:4803 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3d9d84 r8:00000002 r7:60000013 r6:eb3d9d8c r5:853c0c00 r4:853c0c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c0c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85470580 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4865000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b7f8c r4:853b7c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b7f8c r4:85472780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c0c00 r8:854727ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472780 r8:80287e08 r7:eb099e60 r6:852c4700 r5:853c0c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d9fb0 to 0xeb3d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85470380 INFO: task kworker/0:552:4803 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a91b0000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:553:4805 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:553 state:D stack:0 pid:4805 tgid:4805 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3e1d84 r8:00000002 r7:60000113 r6:eb3e1d8c r5:853c5400 r4:853c5400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c5400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854707c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea977000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ac78c r4:854ac400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ac78c r4:85472800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c5400 r8:8547282c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472800 r8:80287e08 r7:eb099e60 r6:852c4780 r5:853c5400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e1fb0 to 0xeb3e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85470740 INFO: task kworker/0:553:4805 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a95af000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:554:4806 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:554 state:D stack:0 pid:4806 tgid:4806 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3e5d84 r8:00000002 r7:60000013 r6:eb3e5d8c r5:853c6c00 r4:853c6c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c6c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854709c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac1f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854acb8c r4:854ac800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854acb8c r4:85472880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c6c00 r8:854728ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472880 r8:80287e08 r7:eb3e1e60 r6:852c4800 r5:853c6c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e5fb0 to 0xeb3e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85470740 INFO: task kworker/0:554:4806 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a95af000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:555:4809 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:555 state:D stack:0 pid:4809 tgid:4809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3e9d84 r8:00000002 r7:60000013 r6:eb3e9d8c r5:853c0000 r4:853c0000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c0000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85470f00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacc3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854adb8c r4:854ad800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854adb8c r4:85472900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c0000 r8:8547292c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472900 r8:80287e08 r7:eb3e5e60 r6:852c4880 r5:853c0000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e9fb0 to 0xeb3e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85470740 INFO: task kworker/0:555:4809 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a982d000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:556:4810 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:556 state:D stack:0 pid:4810 tgid:4810 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3edd84 r8:00000002 r7:60000113 r6:eb3edd8c r5:853bd400 r4:853bd400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853bd400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ede08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85470b80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac47000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854acf8c r4:854acc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854acf8c r4:85472980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853bd400 r8:854729ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472980 r8:80287e08 r7:eb3e9e60 r6:852c4900 r5:853bd400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3edfb0 to 0xeb3edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85470740 INFO: task kworker/0:556:4810 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a99ab000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:557:4812 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:557 state:D stack:0 pid:4812 tgid:4812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3f5d84 r8:00000002 r7:60000013 r6:eb3f5d8c r5:85410c00 r4:85410c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85410c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85470c40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85410c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac71000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ad38c r4:854ad000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ad38c r4:85472a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85410c00 r8:85472a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472a00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472a00 r8:80287e08 r7:eb3e9e60 r6:852c4980 r5:85410c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f5fb0 to 0xeb3f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85470a00 INFO: task kworker/0:557:4812 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a9beb000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:558:4815 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:558 state:D stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3f9d84 r8:00000002 r7:60000113 r6:eb3f9d8c r5:85411800 r4:85411800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85411800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85470dc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85411800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac9b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ad78c r4:854ad400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ad78c r4:85472a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85411800 r8:85472aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472a80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472a80 r8:80287e08 r7:eb3e9e60 r6:852c4a00 r5:85411800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f9fb0 to 0xeb3f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85470bc0 INFO: task kworker/0:558:4815 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a9d60000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:559:4817 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:559 state:D stack:0 pid:4817 tgid:4817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3fdd84 r8:00000002 r7:60000013 r6:eb3fdd8c r5:85412400 r4:85412400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85412400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3fde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85470700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85412400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead9d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854adf8c r4:854adc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854adf8c r4:85472b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85412400 r8:85472b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472b00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472b00 r8:80287e08 r7:eb3e9e60 r6:852c4a80 r5:85412400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3fdfb0 to 0xeb3fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85470d80 INFO: task kworker/0:559:4817 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: aa223000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:560:4819 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:560 state:D stack:0 pid:4819 tgid:4819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb401d84 r8:00000002 r7:60000013 r6:eb401d8c r5:85413000 r4:85413000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85413000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb401e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547f0c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85413000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae05000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ae38c r4:854ae000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ae38c r4:85472b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85413000 r8:85472bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472b80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472b80 r8:80287e08 r7:eb3fde60 r6:852c4b00 r5:85413000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb401fb0 to 0xeb401ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85470ec0 INFO: task kworker/0:560:4819 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: aa31e000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:561:4821 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:561 state:D stack:0 pid:4821 tgid:4821 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb405d84 r8:00000002 r7:60000013 r6:eb405d8c r5:85413c00 r4:85413c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85413c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb405e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547f440 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85413c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf07000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854aeb8c r4:854ae800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854aeb8c r4:85472c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85413c00 r8:85472c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472c00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472c00 r8:80287e08 r7:eb401e60 r6:852c4b80 r5:85413c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb405fb0 to 0xeb405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8547f100 INFO: task kworker/0:561:4821 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: aa5e4000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:562:4824 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:562 state:D stack:0 pid:4824 tgid:4824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb411d84 r8:00000002 r7:60000013 r6:eb411d8c r5:85416000 r4:85416000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85416000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb411e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547f340 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85416000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebf000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ae78c r4:854ae400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ae78c r4:85472c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85416000 r8:85472cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472c80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472c80 r8:80287e08 r7:eb405e60 r6:852c4c00 r5:85416000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb411fb0 to 0xeb411ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8547f1c0 INFO: task kworker/0:562:4824 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: aa5e4000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:563:4825 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:563 state:D stack:0 pid:4825 tgid:4825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb415d84 r8:00000002 r7:60000013 r6:eb415d8c r5:85416c00 r4:85416c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85416c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb415e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547f600 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85416c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf47000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854aef8c r4:854aec00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854aef8c r4:85472d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85416c00 r8:85472d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472d00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472d00 r8:80287e08 r7:eb405e60 r6:852c4c80 r5:85416c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb415fb0 to 0xeb415ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8547f1c0 INFO: task kworker/0:563:4825 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: aa892000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:564:4826 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:564 state:D stack:0 pid:4826 tgid:4826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3f1d84 r8:00000002 r7:60000113 r6:eb3f1d8c r5:8540ec00 r4:8540ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547fc00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8540ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafe5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854af78c r4:854af400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854af78c r4:85472d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540ec00 r8:85472dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472d80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472d80 r8:80287e08 r7:eb415e60 r6:85472e00 r5:8540ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f1fb0 to 0xeb3f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8547f240 INFO: task kworker/0:564:4826 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: aa8e5000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:291:4831 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:291 state:D stack:0 pid:4831 tgid:4831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb435d84 r8:00000002 r7:60000113 r6:eb435d8c r5:8540b000 r4:8540b000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540b000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb435e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f35c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8540b000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadad000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85435f8c r4:85435c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85435f8c r4:852c4d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540b000 r8:852c4dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c4d80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c4d80 r8:80287e08 r7:eb249e60 r6:85472e80 r5:8540b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb435fb0 to 0xeb435ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8548a300 INFO: task kworker/1:291:4831 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: aab9c000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:292:4832 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:292 state:D stack:0 pid:4832 tgid:4832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb439d84 r8:00000002 r7:60000113 r6:eb439d8c r5:85418000 r4:85418000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85418000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb439e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548a8c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85418000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0af000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8442b78c r4:8442b400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8442b78c r4:852c4e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85418000 r8:852c4e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c4e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c4e00 r8:80287e08 r7:eb435e60 r6:85472f00 r5:85418000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb439fb0 to 0xeb439ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8548a300 INFO: task kworker/1:292:4832 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: aaef9000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:565:4833 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:565 state:D stack:0 pid:4833 tgid:4833 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb43dd84 r8:00000002 r7:60000113 r6:eb43dd8c r5:85418c00 r4:85418c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85418c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb43de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547fb40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85418c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafd3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854af38c r4:854af000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854af38c r4:85472f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85418c00 r8:85472fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472f80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472f80 r8:80287e08 r7:eb3f1e60 r6:8547b000 r5:85418c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb43dfb0 to 0xeb43dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8547f840 INFO: task kworker/0:565:4833 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: aaf35000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:566:4836 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:566 state:D stack:0 pid:4836 tgid:4836 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb431d84 r8:00000002 r7:60000113 r6:eb431d8c r5:85419800 r4:85419800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85419800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb431e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547fd80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85419800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb033000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854afb8c r4:854af800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854afb8c r4:8547b080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85419800 r8:8547b0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547b080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547b080 r8:80287e08 r7:eb3f1e60 r6:8547b100 r5:85419800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb431fb0 to 0xeb431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8547fa80 INFO: task kworker/0:566:4836 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: aaf35000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:567:4838 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:567 state:D stack:0 pid:4838 tgid:4838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb40dd84 r8:00000002 r7:60000013 r6:eb40dd8c r5:8541a400 r4:8541a400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8541a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb40de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547f580 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8541a400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb089000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b438c r4:854b4000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b438c r4:8547b180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8541a400 r8:8547b1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547b180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547b180 r8:80287e08 r7:eb431e60 r6:8547b200 r5:8541a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb40dfb0 to 0xeb40dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8547fb80 INFO: task kworker/0:567:4838 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ab43f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:568:4840 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:568 state:D stack:0 pid:4840 tgid:4840 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb441d84 r8:00000002 r7:60000113 r6:eb441d8c r5:8541b000 r4:8541b000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8541b000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb441e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547fec0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8541b000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb03d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854aff8c r4:854afc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854aff8c r4:8547b280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8541b000 r8:8547b2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547b280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547b280 r8:80287e08 r7:eb40de60 r6:8547b300 r5:8541b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb441fb0 to 0xeb441ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8547fd40 INFO: task kworker/0:568:4840 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ab43f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:569:4842 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:569 state:D stack:0 pid:4842 tgid:4842 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb449d84 r8:00000002 r7:60000113 r6:eb449d8c r5:85415400 r4:85415400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85415400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb449e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854688c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85415400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b478c r4:854b4400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b478c r4:8547b380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85415400 r8:8547b3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547b380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547b380 r8:80287e08 r7:eb40de60 r6:852c4e80 r5:85415400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb449fb0 to 0xeb449ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8547fd40 INFO: task kworker/0:569:4842 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ab7fb000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:570:4845 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:570 state:D stack:0 pid:4845 tgid:4845 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb419d84 r8:00000002 r7:60000013 r6:eb419d8c r5:85414800 r4:85414800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85414800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb419e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ffc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85414800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb111000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b4b8c r4:854b4800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b4b8c r4:8547b400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85414800 r8:8547b42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547b400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547b400 r8:80287e08 r7:eb449e60 r6:852c4f00 r5:85414800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb419fb0 to 0xeb419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85468100 INFO: task kworker/0:570:4845 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ab8c1000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:293:4846 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:293 state:D stack:0 pid:4846 tgid:4846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb44dd84 r8:00000002 r7:60000113 r6:eb44dd8c r5:85410000 r4:85410000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85410000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb44de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548abc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85410000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb19d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543438c r4:85434000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543438c r4:852c4f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85410000 r8:852c4fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c4f80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c4f80 r8:80287e08 r7:eb435e60 r6:85488000 r5:85410000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb44dfb0 to 0xeb44dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8548a800 INFO: task kworker/1:293:4846 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: abafb000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:571:4848 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:571 state:D stack:0 pid:4848 tgid:4848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb451d84 r8:00000002 r7:60000113 r6:eb451d8c r5:853c8000 r4:853c8000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c8000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb451e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854811c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1e7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b4f8c r4:854b4c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b4f8c r4:8547b480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c8000 r8:8547b4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547b480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547b480 r8:80287e08 r7:eb419e60 r6:85488080 r5:853c8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb451fb0 to 0xeb451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85468980 INFO: task kworker/0:571:4848 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: abdcb000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:294:4850 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:294 state:D stack:0 pid:4850 tgid:4850 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb445d84 r8:00000002 r7:60000113 r6:eb445d8c r5:853c8c00 r4:853c8c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c8c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb445e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548af00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb28b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543478c r4:85434400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543478c r4:85488100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c8c00 r8:8548812c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85488100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85488100 r8:80287e08 r7:eb435e60 r6:85488180 r5:853c8c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb445fb0 to 0xeb445ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8548aa40 INFO: task kworker/1:294:4850 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: abf03000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:572:4852 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:572 state:D stack:0 pid:4852 tgid:4852 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb459d84 r8:00000002 r7:60000013 r6:eb459d8c r5:853c9800 r4:853c9800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c9800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb459e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85481380 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb23f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b538c r4:854b5000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b538c r4:8547b500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c9800 r8:8547b52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547b500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547b500 r8:80287e08 r7:eb451e60 r6:85488200 r5:853c9800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb459fb0 to 0xeb459ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85481040 INFO: task kworker/0:572:4852 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ac162000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:573:4853 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:573 state:D stack:0 pid:4853 tgid:4853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb45dd84 r8:00000002 r7:60000013 r6:eb45dd8c r5:853ca400 r4:853ca400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ca400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb45de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85481740 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb467000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b5b8c r4:854b5800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b5b8c r4:8547b580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ca400 r8:8547b5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547b580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547b580 r8:80287e08 r7:eb459e60 r6:85488280 r5:853ca400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb45dfb0 to 0xeb45dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:854812c0 INFO: task kworker/0:573:4853 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ac440000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:574:4855 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:574 state:D stack:0 pid:4855 tgid:4855 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb455d84 r8:00000002 r7:60000013 r6:eb455d8c r5:853cb000 r4:853cb000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853cb000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb455e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854814c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb25f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b578c r4:854b5400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b578c r4:8547b600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853cb000 r8:8547b62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547b600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547b600 r8:80287e08 r7:eb45de60 r6:85488300 r5:853cb000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb455fb0 to 0xeb455ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85481340 INFO: task kworker/0:574:4855 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ac440000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:295:4858 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:295 state:D stack:0 pid:4858 tgid:4858 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb461d84 r8:00000002 r7:60000113 r6:eb461d8c r5:853cbc00 r4:853cbc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853cbc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb461e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85489700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85434b8c r4:85434800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85434b8c r4:85488380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853cbc00 r8:854883ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85488380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85488380 r8:80287e08 r7:eb435e60 r6:85488400 r5:853cbc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb461fb0 to 0xeb461ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8548ad80 INFO: task kworker/1:295:4858 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ac91d000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:575:4860 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:575 state:D stack:0 pid:4860 tgid:4860 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb47dd84 r8:00000002 r7:60000013 r6:eb47dd8c r5:853cd400 r4:853cd400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853cd400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb47de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85481840 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb473000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b5f8c r4:854b5c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b5f8c r4:8547b680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853cd400 r8:8547b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547b680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547b680 r8:80287e08 r7:eb45de60 r6:85488480 r5:853cd400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb47dfb0 to 0xeb47dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:854815c0 INFO: task kworker/0:575:4860 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ac91d000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:576:4862 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:576 state:D stack:0 pid:4862 tgid:4862 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb485d84 r8:00000002 r7:60000013 r6:eb485d8c r5:853cc800 r4:853cc800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853cc800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb485e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85481d80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4b7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b6f8c r4:854b6c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b6f8c r4:8547b700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853cc800 r8:8547b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547b700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547b700 r8:80287e08 r7:eb47de60 r6:85488500 r5:853cc800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb485fb0 to 0xeb485ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:854815c0 INFO: task kworker/0:576:4862 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: acae4000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:577:4864 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:577 state:D stack:0 pid:4864 tgid:4864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb495d84 r8:00000002 r7:60000113 r6:eb495d8c r5:853ce000 r4:853ce000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ce000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb495e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85481980 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb487000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b638c r4:854b6000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b638c r4:8547b780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ce000 r8:8547b7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547b780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547b780 r8:80287e08 r7:eb485e60 r6:85488580 r5:853ce000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb495fb0 to 0xeb495ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:854815c0 INFO: task kworker/0:577:4864 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ace70000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:578:4865 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:578 state:D stack:0 pid:4865 tgid:4865 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4a1d84 r8:00000002 r7:60000113 r6:eb4a1d8c r5:853d0000 r4:853d0000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d0000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85481b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb497000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b678c r4:854b6400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b678c r4:8547b800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d0000 r8:8547b82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547b800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547b800 r8:80287e08 r7:eb485e60 r6:85488600 r5:853d0000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a1fb0 to 0xeb4a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:854815c0 INFO: task kworker/0:578:4865 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ad071000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:579:4867 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:579 state:D stack:0 pid:4867 tgid:4867 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4a9d84 r8:00000002 r7:60000013 r6:eb4a9d8c r5:853d1800 r4:853d1800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d1800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85481c40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853d1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4ab000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b6b8c r4:854b6800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b6b8c r4:8547b880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d1800 r8:8547b8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547b880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547b880 r8:80287e08 r7:eb485e60 r6:85488680 r5:853d1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a9fb0 to 0xeb4a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85481900 INFO: task kworker/0:579:4867 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ad251000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:580:4869 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:580 state:D stack:0 pid:4869 tgid:4869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4c1d84 r8:00000002 r7:60000013 r6:eb4c1d8c r5:853d3000 r4:853d3000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d3000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85481480 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b778c r4:854b7400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b778c r4:8547b900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d3000 r8:8547b92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547b900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547b900 r8:80287e08 r7:eb485e60 r6:85488700 r5:853d3000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c1fb0 to 0xeb4c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85481ac0 INFO: task kworker/0:580:4869 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ad447000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:581:4873 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:581 state:D stack:0 pid:4873 tgid:4873 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb465d84 r8:00000002 r7:60000013 r6:eb465d8c r5:853d0c00 r4:853d0c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d0c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb465e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85481f40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4cb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b738c r4:854b7000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: ad75d000 ed6eb000 00000001 80239b98 7f047000 00000001 r4:dffe1dc0 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:296:4874 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:296 state:D stack:0 pid:4874 tgid:4874 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4d5d84 r8:00000002 r7:60000113 r6:eb4d5d8c r5:853d3c00 r4:853d3c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d3c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85489e40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e061d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543538c r4:85435000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543538c r4:85488780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d3c00 r8:854887ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85488780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85488780 r8:80287e08 r7:eb435e60 r6:85488880 r5:853d3c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d5fb0 to 0xeb4d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85489580 INFO: task kworker/1:296:4874 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ad966000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8547ba00 Exception stack(0xeb4e1fb0 to 0xeb4e1ff8) Workqueue: events bpf_prog_free_deferred 1d20: ad966000 ed6eb000 00000001 80239b98 7f047000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r5:85d2778c r4:85d27400 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:583:4878 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:583 state:D stack:0 pid:4878 tgid:4878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4edd84 r8:00000002 r7:60000013 r6:eb4edd8c r5:853d5400 r4:853d5400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d5400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ede08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548f040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853d5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4ef000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b7f8c r4:854b7c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b7f8c r4:8547ba80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d5400 r8:8547baac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547ba80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547ba80 r8:80287e08 r7:eb4e1e60 r6:85488980 r5:853d5400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4edfb0 to 0xeb4edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85481d40 INFO: task kworker/0:583:4878 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ade2c000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:584:4880 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:dfa47000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeaf51fb0 to 0xeaf51ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8548f100 INFO: task kworker/0:584:4880 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ade2c000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:848cab40 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b878c r4:854b8400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eb64f000 r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:586:4884 blocked for more than 464 seconds. r4:853d2400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548f600 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:587:4886 blocked for more than 464 seconds. r10:8291a684 r9:eb4b5d84 r8:00000002 r7:60000113 r6:eb4b5d8c r5:853cec00 r4:853cec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853cec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548f800 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06f1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b8f8c r4:854b8c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b8f8c r4:8547bc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853cec00 r8:8547bcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547bc80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547bc80 r8:80287e08 r7:eb4f9e60 r6:85488b80 r5:853cec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b5fb0 to 0xeb4b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8548f100 INFO: task kworker/0:587:4886 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ae57e000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:854b938c r4:8547bd00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8548f5c0 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eb64f000 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548fac0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa1d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b978c r4:854b9400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b978c r4:8547bd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d8c00 r8:8547bdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547bd80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547bd80 r8:80287e08 r7:eb471e60 r6:85488c80 r5:853d8c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb501fb0 to 0xeb501ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8548f780 INFO: task kworker/0:589:4892 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ae8e6000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:590:4894 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:590 state:D stack:0 pid:4894 tgid:4894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb505d84 r8:00000002 r7:60000113 r6:eb505d8c r5:853d9800 r4:853d9800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d9800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb505e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548fc00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa81000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b9b8c r4:854b9800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b9b8c r4:8547be00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d9800 r8:8547be2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547be00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547be00 r8:80287e08 r7:eb501e60 r6:85488d00 r5:853d9800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: aeacb000 ed6eb000 00000001 80239b98 7f047000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:591 state:D stack:0 pid:4896 tgid:4896 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb509e08 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:853da400 r8:8547beac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: aee0d000 ed6eb000 00000001 80239b98 7f047000 00000001 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab4d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ba78c r4:854ba400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ba78c r4:8547bf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853dbc00 r8:8547bf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8547bf00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547bf00 r8:80287e08 r7:eb509e60 r6:85488e00 r5:853dbc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb511fb0 to 0xeb511ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8548fb80 INFO: task kworker/0:592:4898 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: aef07000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:297:4899 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:297 state:D stack:0 pid:4899 tgid:4899 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb515d84 r8:00000002 r7:60000113 r6:eb515d8c r5:853dc800 r4:853dc800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853dc800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb515e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85492600 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacfd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543578c r4:85435400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543578c r4:85488e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853dc800 r8:85488eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85488e80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85488e80 r8:80287e08 r7:eb435e60 r6:85488f00 r5:853dc800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb515fb0 to 0xeb515ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8547f480 INFO: task kworker/1:297:4899 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eb64f000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:593 state:D stack:0 pid:4901 tgid:4901 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb51de08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8547bf80 Exception stack(0xeb51dfb0 to 0xeb51dff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: af20c000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:594:4903 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:594 state:D stack:0 pid:4903 tgid:4903 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb525d84 r8:00000002 r7:60000013 r6:eb525d8c r5:853dec00 r4:853dec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853dec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb525e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548f500 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab87000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bab8c r4:854ba800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bab8c r4:85485000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853dec00 r8:8548502c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85485000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85485000 r8:80287e08 r7:eb511e60 r6:85495000 r5:853dec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb525fb0 to 0xeb525ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8548f940 INFO: task kworker/0:594:4903 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: af305000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:595:4904 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:595 state:D stack:0 pid:4904 tgid:4904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb529d84 r8:00000002 r7:60000013 r6:eb529d8c r5:853e0000 r4:853e0000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e0000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb529e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548a400 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 r5:00001000 r4:eabc9000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:853e0000 r8:854850ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bb78c r4:854bb400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bb78c r4:85485100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8541d400 r8:8548512c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85485100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85485100 r8:80287e08 r7:eb529e60 r6:85485180 r5:8541d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4fdfb0 to 0xeb4fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8548ff40 INFO: task kworker/0:596:4906 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: af7e8000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:298:4910 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:298 state:D stack:0 pid:4910 tgid:4910 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb52dd84 r8:00000002 r7:60000013 r6:eb52dd8c r5:8541e000 r4:8541e000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8541e000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb52de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f36c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8541e000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543638c r4:85436000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543638c r4:85495100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8541e000 r8:8549512c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85495100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85495100 r8:80287e08 r7:eb435e60 r6:85485200 r5:8541e000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb52dfb0 to 0xeb52dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85492500 INFO: task kworker/1:298:4910 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: afb71000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:597:4911 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:597 state:D stack:0 pid:4911 tgid:4911 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb531d84 r8:00000002 r7:60000013 r6:eb531d8c r5:8541c800 r4:8541c800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8541c800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb531e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548e100 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8541c800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead71000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bb38c r4:854bb000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bb38c r4:85485280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8541c800 r8:854852ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85485280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85485280 r8:80287e08 r7:eb4fde60 r6:85485300 r5:8541c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb531fb0 to 0xeb531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8548e0c0 INFO: task kworker/0:597:4911 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: afc1f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:598:4913 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:598 state:D stack:0 pid:4913 tgid:4913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb50dd84 r8:00000002 r7:60000113 r6:eb50dd8c r5:8541bc00 r4:8541bc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8541bc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb50de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548efc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8541bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa1f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c1b8c r4:854c1800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c1b8c r4:85485380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8541bc00 r8:854853ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85485380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85485380 r8:80287e08 r7:eb4fde60 r6:85485400 r5:8541bc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb50dfb0 to 0xeb50dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: afc1f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:599:4915 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:599 state:D stack:0 pid:4915 tgid:4915 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb535d84 r8:00000002 r7:60000113 r6:eb535d8c r5:8541ec00 r4:8541ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8541ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb535e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548e540 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8541ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf53000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bbb8c r4:854bb800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bbb8c r4:85485480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8541ec00 r8:854854ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85485480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85485480 r8:80287e08 r7:eb50de60 r6:85485500 r5:8541ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb535fb0 to 0xeb535ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8548e340 INFO: task kworker/0:599:4915 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: affef000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:600:4916 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:600 state:D stack:0 pid:4916 tgid:4916 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb53dd84 r8:00000002 r7:60000113 r6:eb53dd8c r5:853e3c00 r4:853e3c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e3c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb53de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548e700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf89000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bbf8c r4:854bbc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bbf8c r4:85485580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e3c00 r8:854855ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85485580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85485580 r8:80287e08 r7:eb50de60 r6:85495180 r5:853e3c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb53dfb0 to 0xeb53dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8548e340 INFO: task kworker/0:600:4916 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b01ee000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:601:4919 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:601 state:D stack:0 pid:4919 tgid:4919 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb549d84 r8:00000002 r7:60000113 r6:eb549d8c r5:853e5400 r4:853e5400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e5400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb549e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548e800 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb161000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c038c r4:854c0000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c038c r4:85485600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e5400 r8:8548562c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85485600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85485600 r8:80287e08 r7:eb50de60 r6:85495200 r5:853e5400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb549fb0 to 0xeb549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8548e600 INFO: task kworker/0:601:4919 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d20: b02c7000 ed6eb000 00000001 80239b98 7f047000 00000001 r4:dffe1dc0 r5:00001000 r4:eb64f000 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:602:4921 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:602 state:D stack:0 pid:4921 tgid:4921 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb551d84 r8:00000002 r7:60000113 r6:eb551d8c r5:853e3000 r4:853e3000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e3000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb551e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548e940 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb183000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c078c r4:854c0400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c078c r4:85485680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e3000 r8:854856ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85485680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85485680 r8:80287e08 r7:eb50de60 r6:85495280 r5:853e3000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb551fb0 to 0xeb551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8548e7c0 INFO: task kworker/0:602:4921 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b06c7000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:603:4922 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:603 state:D stack:0 pid:4922 tgid:4922 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb555d84 r8:00000002 r7:60000113 r6:eb555d8c r5:853e6c00 r4:853e6c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e6c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb555e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548eac0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb195000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c0b8c r4:854c0800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c0b8c r4:85485700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e6c00 r8:8548572c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85485700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85485700 r8:80287e08 r7:eb50de60 r6:85495300 r5:853e6c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb555fb0 to 0xeb555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8548e7c0 INFO: task kworker/0:603:4922 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b0a04000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:604:4924 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:604 state:D stack:0 pid:4924 tgid:4924 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb55dd84 r8:00000002 r7:60000113 r6:eb55dd8c r5:853e6000 r4:853e6000 r5:853e6000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb55de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548e8c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c0f8c r4:854c0c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c0f8c r4:85485780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e6000 r8:854857ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85485780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85485780 r8:80287e08 r7:eb50de60 r6:85495380 r5:853e6000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb55dfb0 to 0xeb55dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8548e8c0 INFO: task kworker/0:604:4924 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b0a74000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b0cc0000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:607:4930 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:607 state:D stack:0 pid:4930 tgid:4930 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3c1d84 r8:00000002 r7:60000113 r6:eb3c1d8c r5:853e1800 r4:853e1800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e1800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e5040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa91000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c1f8c r4:854c1c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c1f8c r4:85485900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e1800 r8:8548592c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85485900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85485900 r8:80287e08 r7:eb50de60 r6:85495500 r5:853e1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c1fb0 to 0xeb3c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r4:00000000 r5:85d2778c r4:85d27400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:853dd400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3cde08 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:853dd400 r8:854859ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: b0f3f000 ed6eb000 00000001 80239b98 7f047000 00000001 r4:dffe1dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:609:4934 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:609 state:D stack:0 pid:4934 tgid:4934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb46dd84 r8:00000002 r7:60000113 r6:eb46dd8c r5:853e8000 r4:853e8000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e8000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb46de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e5280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe45000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c238c r4:854c2000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c238c r4:85485a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e8000 r8:85485a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85485a00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85485a00 r8:80287e08 r7:eb3cde60 r6:85495600 r5:853e8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb46dfb0 to 0xeb46dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:854e51c0 INFO: task kworker/0:609:4934 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r5:80070013 r4:80239bb0 r4:dffe1dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:610:4936 blocked for more than 465 seconds. [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e5400 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:853e9800 r8:85485aac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:611:4938 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:611 state:D stack:0 pid:4938 tgid:4938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb49dd84 r8:00000002 r7:60000013 r6:eb49dd8c r5:853eb000 r4:853eb000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853eb000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb49de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e5ac0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac27000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c3b8c r4:854c3800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c3b8c r4:85485b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853eb000 r8:85485b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85485b00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85485b00 r8:80287e08 r7:eb3cde60 r6:85495700 r5:853eb000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb49dfb0 to 0xeb49dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:854e5200 INFO: task kworker/0:611:4938 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b126f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:612:4940 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:612 state:D stack:0 pid:4940 tgid:4940 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4b1d84 r8:00000002 r7:60000013 r6:eb4b1d8c r5:853ea400 r4:853ea400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ea400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e5640 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0583000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c2f8c r4:854c2c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c2f8c r4:85485b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ea400 r8:85485bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85485b80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85485b80 r8:80287e08 r7:eb49de60 r6:85495780 r5:853ea400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b1fb0 to 0xeb4b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:854e5580 INFO: task kworker/0:612:4940 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b14e7000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:613:4942 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:613 state:D stack:0 pid:4942 tgid:4942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb539d84 r8:00000002 r7:60000113 r6:eb539d8c r5:8540d400 r4:8540d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c338c r4:854c3000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb539fb0 to 0xeb539ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r5:85d2778c r4:85d27400 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:8540e000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4bde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e5900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8540e000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea96f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c378c r4:854c3400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c378c r4:85485d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540e000 r8:85485d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85485d00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85485d00 r8:80287e08 r7:eb49de60 r6:85485d80 r5:8540e000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4bdfb0 to 0xeb4bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:854e5840 INFO: task kworker/0:614:4945 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b1aae000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:615:4947 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:615 state:D stack:0 pid:4947 tgid:4947 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4d1d84 r8:00000002 r7:60000113 r6:eb4d1d8c r5:85420000 r4:85420000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85420000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e5c80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85420000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac61000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c3f8c r4:854c3c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c3f8c r4:85485e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85420000 r8:85485e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85485e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85485e00 r8:80287e08 r7:eb49de60 r6:85485e80 r5:85420000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d1fb0 to 0xeb4d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:854e5940 INFO: task kworker/0:615:4947 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b1aae000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:616:4948 blocked for more than 465 seconds. Workqueue: events bpf_prog_free_deferred r5:85420c00 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xdffe1d28 to 0xdffe1d70) 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:617:4950 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:617 state:D stack:0 pid:4950 tgid:4950 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4f5d84 r8:00000002 r7:60000013 r6:eb4f5d8c r5:85422400 r4:85422400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85422400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eb140 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85422400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf4d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c878c r4:854c8400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c878c r4:854f8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85422400 r8:854f802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f8000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f8000 r8:80287e08 r7:eb541e60 r6:854f8080 r5:85422400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f5fb0 to 0xeb4f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:854e5a40 INFO: task kworker/0:617:4950 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b1e57000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:299:4954 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:299 state:D stack:0 pid:4954 tgid:4954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb57dd84 r8:00000002 r7:60000113 r6:eb57dd8c r5:85421800 r4:85421800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85421800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb57de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588940 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85421800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb347000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85437b8c r4:85437800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85437b8c r4:85495800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85421800 r8:8549582c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85495800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85495800 r8:80287e08 r7:eb52de60 r6:85495880 r5:85421800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb57dfb0 to 0xeb57dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:854f3440 INFO: task kworker/1:299:4954 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b1e57000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b23ac000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:301:4961 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:301 state:D stack:0 pid:4961 tgid:4961 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb581d84 r8:00000002 r7:60000113 r6:eb581d8c r5:853ed400 r4:853ed400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ed400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb581e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f3c40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafdd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85436b8c r4:85436800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85436b8c r4:85495a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ed400 r8:85495aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85495a80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85495a80 r8:80287e08 r7:eb57de60 r6:85495b00 r5:853ed400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb581fb0 to 0xeb581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:854f37c0 INFO: task kworker/1:301:4961 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b2874000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:619:4962 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:619 state:D stack:0 pid:4962 tgid:4962 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb589d84 r8:00000002 r7:60000013 r6:eb589d8c r5:853ee000 r4:853ee000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ee000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb589e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eb780 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853ee000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c978c r4:854c9400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c978c r4:854f8180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ee000 r8:854f81ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f8180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f8180 r8:80287e08 r7:eb4e9e60 r6:85495b80 r5:853ee000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb589fb0 to 0xeb589ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:854eb180 INFO: task kworker/0:619:4962 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:853eec00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb58de08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:854f8200 r8:80287e08 r7:eb589e60 r6:85495c00 r5:853eec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:00000000 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:621:4966 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:621 state:D stack:0 pid:4966 tgid:4966 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb585d84 r8:00000002 r7:60000113 r6:eb585d8c r5:853e8c00 r4:853e8c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e8c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb585e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eb680 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb005000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c938c r4:854c9000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c938c r4:854f8280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e8c00 r8:854f82ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f8280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f8280 r8:80287e08 r7:eb589e60 r6:85495c80 r5:853e8c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb585fb0 to 0xeb585ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:dffe1dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb59de08 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb59dfb0 to 0xeb59dff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r5:85d2778c r4:85d27400 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eb8c0 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c9b8c r4:854c9800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c9b8c r4:854f8380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85521800 r8:854f83ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f8380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f8380 r8:80287e08 r7:eb59de60 r6:85495d80 r5:85521800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a5fb0 to 0xeb5a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:854eb580 INFO: task kworker/0:623:4971 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b2dec000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:624:4972 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:624 state:D stack:0 pid:4972 tgid:4972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5a9d84 r8:00000002 r7:60000113 r6:eb5a9d8c r5:85522400 r4:85522400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85522400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eba00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85522400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c9f8c r4:854c9c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c9f8c r4:854f8400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85522400 r8:854f842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f8400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f8400 r8:80287e08 r7:eb59de60 r6:85495e00 r5:85522400 r4:00000001 Exception stack(0xeb5a9fb0 to 0xeb5a9ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:dffe1dc0 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:625:4974 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:625 state:D stack:0 pid:4974 tgid:4974 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5b1d84 r8:00000002 r7:60000113 r6:eb5b1d8c r5:85520c00 r4:85520c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85520c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ebb00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85520c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb11d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ca38c r4:854ca000 r7:dddced80 r6:83018000 r5:854ca38c r4:854f8480 Exception stack(0xeb5b1fb0 to 0xeb5b1ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r4:dffe1dc0 r5:00001000 r4:eb64f000 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:302:4975 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:302 state:D stack:0 pid:4975 tgid:4975 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5b5d84 r8:00000002 r7:60000113 r6:eb5b5d8c r5:85523c00 r4:85523c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85523c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85574600 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85523c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb185000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d338c r4:854d3000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85523c00 r8:85495f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r5:80070013 r4:80239bb0 r4:dffe1dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:848cab40 task:kworker/0:626 state:D stack:0 pid:4977 tgid:4977 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5bde08 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ca78c r4:854ca400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:627:4979 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:627 state:D stack:0 pid:4979 tgid:4979 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5c5d84 r8:00000002 r7:60000013 r6:eb5c5d8c r5:85526000 r4:85526000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85526000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ebe00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85526000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854cab8c r4:854ca800 r7:dddced80 r6:83018000 r5:854cab8c r4:854f8580 r10:00000000 r9:854f8580 r8:80287e08 r7:eb59de60 r6:854fe080 r5:85526000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xdffe1d28 to 0xdffe1d70) r5:80070013 r4:80239bb0 r4:dffe1dc0 r5:00001000 r4:eb64f000 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/0:628:4981 blocked for more than 465 seconds. [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ebf40 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85525400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb267000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854caf8c r4:854cac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854caf8c r4:854f8600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85525400 r8:854f862c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f8600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f8600 r8:80287e08 r7:eb59de60 r6:854fe100 r5:85525400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5cdfb0 to 0xeb5cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:854ebc40 INFO: task kworker/0:628:4981 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b3836000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 task:kworker/0:629 state:D stack:0 pid:4983 tgid:4983 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:854cb38c r4:854f8680 r10:00000000 r9:854f8680 r8:80287e08 r7:eb59de60 r6:854fe180 r5:85524800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:dffe1dc0 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:eb5ddd84 r8:00000002 r7:60000113 r6:eb5ddd8c r5:85526c00 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85526c00 r8:854f872c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f8700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f8700 r8:80287e08 r7:eb59de60 r6:854fe200 r5:85526c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5ddfb0 to 0xeb5ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:854ebfc0 INFO: task kworker/0:630:4985 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b396e000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:631:4987 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:631 state:D stack:0 pid:4987 tgid:4987 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5e5d84 r8:00000002 r7:60000013 r6:eb5e5d8c r5:853db000 r4:853db000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853db000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e5ec0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853db000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854cbb8c r4:854cb800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb5e5fb0 to 0xeb5e5ff8) r4:854f3180 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85509040 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:854cbf8c r4:854f8800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85529800 r8:854f882c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f8800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f8800 r8:80287e08 r7:eb5dde60 r6:854fe300 r5:85529800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:855091c0 INFO: task kworker/0:632:4990 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b3d24000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:633:4992 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:633 state:D stack:0 pid:4992 tgid:4992 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5f9d84 r8:00000002 r7:60000113 r6:eb5f9d8c r5:85528000 r4:85528000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85528000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85509400 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85528000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r5:85d2778c r4:85d27400 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 task:kworker/0:634 state:D stack:0 pid:4994 tgid:4994 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb601d84 r8:00000002 r7:60000113 r6:eb601d8c r5:85528c00 r4:85528c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85528c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb601e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85509a80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85528c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3d5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854cdb8c r4:854cd800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854cdb8c r4:854f8900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85528c00 r8:854f892c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f8900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f8900 r8:80287e08 r7:eb5f9e60 r6:854fe400 r5:85528c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb601fb0 to 0xeb601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85509200 INFO: task kworker/0:634:4994 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b425b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred r5:8552a400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85509540 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ccb8c r4:854cc800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: b425b000 ed6eb000 00000001 80239b98 7f047000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:636:4997 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:636 state:D stack:0 pid:4997 tgid:4997 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb60dd84 r8:00000002 r7:60000113 r6:eb60dd8c r5:8552c800 r4:8552c800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8552c800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb60de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85509700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8552c800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb391000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ccf8c r4:854ccc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ccf8c r4:854f8a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8552c800 r8:854f8a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f8a00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f8a00 r8:80287e08 r7:eb601e60 r6:854fe500 r5:8552c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb60dfb0 to 0xeb60dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:855093c0 INFO: task kworker/0:636:4997 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r5:85d2778c r4:85d27400 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:637:4999 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:637 state:D stack:0 pid:4999 tgid:4999 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb615d84 r8:00000002 r7:60000113 r6:eb615d8c r5:8552d400 r4:8552d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8552d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb615e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85509600 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8552d400 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb39f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854cd38c r4:854cd000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854cd38c r4:854f8a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8552d400 r8:854f8aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f8a80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f8a80 r8:80287e08 r7:eb601e60 r6:854fe580 r5:8552d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb615fb0 to 0xeb615ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854cd78c r4:854cd400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854cd78c r4:854f8b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8552b000 r8:854f8b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f8b00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f8b00 r8:80287e08 r7:eb601e60 r6:854fe600 r5:8552b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb61dfb0 to 0xeb61dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:855096c0 INFO: task kworker/0:638:5001 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b4a0f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ce38c r4:854ce000 r7:dddced80 r6:83018000 r5:854ce38c r4:854f8b80 r10:61c88647 r9:8552bc00 r8:854f8bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f8b80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f8b80 r8:80287e08 r7:eb601e60 r6:854fe680 r5:8552bc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb625fb0 to 0xeb625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85509800 INFO: task kworker/0:639:5003 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d20: b4a0f000 ed6eb000 00000001 80239b98 7f047000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854cdf8c r4:854cdc00 r7:dddced80 r6:83018000 r5:854cdf8c r4:854f8c00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r5:80070013 r4:80239bb0 r4:dffe1dc0 r5:00001000 r4:eb64f000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:641 state:D stack:0 pid:5008 tgid:5008 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85530c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb639e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85509f40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85530c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4cd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ceb8c r4:854ce800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ceb8c r4:854f8c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85530c00 r8:854f8cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f8c80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f8c80 r8:80287e08 r7:eb625e60 r6:854fe780 r5:85530c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb639fb0 to 0xeb639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85509a40 INFO: task kworker/0:641:5008 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b4f65000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 INFO: task kworker/0:642:5009 blocked for more than 465 seconds. r4:85531800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb63de08 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:854f8d00 Exception stack(0xeb63dfb0 to 0xeb63dff8) r4:85509b80 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb645d84 r8:00000002 r7:60000113 r6:eb645d8c r5:85530000 r4:85530000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85530000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb645e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85468fc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85530000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb647000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854cef8c r4:854cec00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854cef8c r4:854f8d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85530000 r8:854f8dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f8d80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f8d80 r8:80287e08 r7:eb639e60 r6:854fe880 r5:85530000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb645fb0 to 0xeb645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85509e80 INFO: task kworker/0:643:5011 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b532c000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) r4:848cab40 Workqueue: events bpf_prog_free_deferred r5:85533c00 r4:8291a680 r4:00000000 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854cfb8c r4:854cf800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb655fb0 to 0xeb655ff8) r4:85492100 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r5:80070013 r4:80239bb0 r4:dffe1dc0 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 INFO: task kworker/0:645:5015 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:645 state:D stack:0 pid:5015 tgid:5015 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb659d84 r8:00000002 r7:60000113 r6:eb659d8c r5:85534800 r4:85534800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85534800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb659e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551e0c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85534800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb65b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854cf38c r4:854cf000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854cf38c r4:854f8e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85534800 r8:854f8eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f8e80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f8e80 r8:80287e08 r7:eb655e60 r6:854fe980 r5:85534800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb659fb0 to 0xeb659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85481ac0 INFO: task kworker/0:645:5015 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b57bf000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eb669d84 r8:00000002 r7:60000013 r6:eb669d8c r5:85533000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854cf78c r4:854cf400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854cf78c r4:854f8f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85533000 r8:854f8f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f8f00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f8f00 r8:80287e08 r7:eb655e60 r6:854fea00 r5:85533000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb669fb0 to 0xeb669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8551e000 INFO: task kworker/0:646:5017 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b57bf000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:848cab40 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854cff8c r4:854cfc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:854f8f80 r8:80287e08 r7:eb655e60 r6:854fea80 r5:85536000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:dffe1dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:648:5022 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:648 state:D stack:0 pid:5022 tgid:5022 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb681d84 r8:00000002 r7:60000113 r6:eb681d8c r5:85535400 r4:85535400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85535400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb681e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551e800 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85535400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0739000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d078c r4:854d0400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d078c r4:8555f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85535400 r8:8555f02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8555f000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8555f000 r8:80287e08 r7:eb679e60 r6:854feb00 r5:85535400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb681fb0 to 0xeb681ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8551e2c0 INFO: task kworker/0:648:5022 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b5edd000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e0659000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eb64f000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551e940 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb685fb0 to 0xeb685ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8551e680 INFO: task kworker/0:650:5027 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b6234000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:651:5028 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:651 state:D stack:0 pid:5028 tgid:5028 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb595d84 r8:00000002 r7:60000113 r6:eb595d8c r5:85426000 r4:85426000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85426000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551ee00 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d178c r4:854d1400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdffe1fb0 to 0xdffe1ff8) r4:848cab40 task:kworker/0:652 state:D stack:0 pid:5031 tgid:5031 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85426c00 r8:8555f3ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r5:80070013 r4:80239bb0 r4:dffe1dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:653:5033 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:653 state:D stack:0 pid:5033 tgid:5033 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb695d84 r8:00000002 r7:60000113 r6:eb695d8c r5:85423c00 r4:85423c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85423c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb695e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551ec80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85423c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d138c r4:854d1000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d138c r4:8555f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85423c00 r8:8555f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8555f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8555f480 r8:80287e08 r7:eb595e60 r6:8555f500 r5:85423c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb695fb0 to 0xeb695ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8551ea80 INFO: task kworker/0:653:5033 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b66be000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc5-syzkaller #0 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb699e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb699fb0 to 0xeb699ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: b66be000 ed6eb000 00000001 80239b98 7f047000 00000001 r4:dffe1dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:655:5036 blocked for more than 466 seconds. r4:85598000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:00001000 r4:eab91000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d1b8c r4:854d1800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d1b8c r4:8555f680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85598000 r8:8555f6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8555f680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8555f680 r8:80287e08 r7:eb699e60 r6:8555f700 r5:85598000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb691fb0 to 0xeb691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8551ec00 INFO: task kworker/0:655:5036 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b69c3000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:656:5039 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:656 state:D stack:0 pid:5039 tgid:5039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6a9d84 r8:00000002 r7:60000113 r6:eb6a9d8c r5:8552e000 r4:8552e000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8552e000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:00001000 r4:eace3000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8555f780 Exception stack(0xeb6a9fb0 to 0xeb6a9ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eb64f000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:657:5041 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:657 state:D stack:0 pid:5041 tgid:5041 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6b1d84 r8:00000002 r7:60000113 r6:eb6b1d8c r5:85536c00 r4:85536c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85536c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85509ec0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85536c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead59000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d238c r4:854d2000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d238c r4:8555f800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85536c00 r8:8555f82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8555f800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8555f800 r8:80287e08 r7:eb699e60 r6:854fec00 r5:85536c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b1fb0 to 0xeb6b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85509fc0 INFO: task kworker/0:657:5041 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b69c3000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred r5:85532400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855740c0 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85532400 r8:8555f8ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b6dde000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:659:5044 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:659 state:D stack:0 pid:5044 tgid:5044 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6bdd84 r8:00000002 r7:60000113 r6:eb6bdd8c r5:85538c00 r4:85538c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85538c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6bde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855742c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85538c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf71000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d2b8c r4:854d2800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d2b8c r4:8555f900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/0:660:5046 blocked for more than 466 seconds. [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85574800 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85538000 r8:8555f9ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: b72c5000 ed6eb000 00000001 80239b98 7f047000 00000001 r4:dffe1dc0 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:661:5048 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:661 state:D stack:0 pid:5048 tgid:5048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6c9d84 r8:00000002 r7:60000113 r6:eb6c9d8c r5:8553a400 r4:8553a400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8553a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85574740 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8553a400 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1bf000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d378c r4:854d3400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d378c r4:8555fa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8553a400 r8:8555fa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8555fa00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8555fa00 r8:80287e08 r7:eb6c5e60 r6:854fee00 r5:8553a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c9fb0 to 0xeb6c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85574280 INFO: task kworker/0:661:5048 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b72c5000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:303:5052 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:303 state:D stack:0 pid:5052 tgid:5052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6d1d84 r8:00000002 r7:60000113 r6:eb6d1d8c r5:8553b000 r4:8553b000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8553b000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588540 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8553b000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0a9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543778c r4:85437400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543778c r4:854fee80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8553b000 r8:854feeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854fee80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fee80 r8:80287e08 r7:eb57de60 r6:854fef00 r5:8553b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d1fb0 to 0xeb6d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:855616c0 INFO: task kworker/1:303:5052 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b77cf000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:662:5053 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:662 state:D stack:0 pid:5053 tgid:5053 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6d5d84 r8:00000002 r7:60000113 r6:eb6d5d8c r5:8553c800 r4:8553c800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8553c800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85574ac0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8553c800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb519000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d438c r4:854d4000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d438c r4:8555fa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8553c800 r8:8555faac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8555fa80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8555fa80 r8:80287e08 r7:eb6c5e60 r6:854fef80 r5:8553c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d5fb0 to 0xeb6d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85574680 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r5:85d2778c r4:85d27400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:663:5054 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:663 state:D stack:0 pid:5054 tgid:5054 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6d9d84 r8:00000002 r7:60000113 r6:eb6d9d8c r5:8553d400 r4:8553d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8553d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85574980 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8553d400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2af000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d3f8c r4:854d3c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d3f8c r4:8555fb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8553d400 r8:8555fb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8555fb00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8555fb00 r8:80287e08 r7:eb6d5e60 r6:85581000 r5:8553d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d9fb0 to 0xeb6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85574680 INFO: task kworker/0:663:5054 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:dffe1dc0 r5:00001000 r4:eb64f000 r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r5:8553bc00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e1e08 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8553bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb559000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d4b8c r4:854d4800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d4b8c r4:8555fb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8553bc00 r8:8555fbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8555fb80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8555fb80 r8:80287e08 r7:eb6d5e60 r6:85581080 r5:8553bc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6e1fb0 to 0xeb6e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85574780 INFO: task kworker/0:664:5056 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b7d8f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) r4:848cab40 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb545000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8555fc00 r8:80287e08 r7:eb6e1e60 r6:85581100 r5:8553e000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:848cab40 task:kworker/0:666 state:D stack:0 pid:5061 tgid:5061 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e5e08 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6e5fb0 to 0xeb6e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85574b80 INFO: task kworker/0:666:5061 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b812d000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:667:5063 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:667 state:D stack:0 pid:5063 tgid:5063 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6a1d84 r8:00000002 r7:60000013 r6:eb6a1d8c r5:8559b000 r4:8559b000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d4f8c r4:854d4c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d4f8c r4:8555fd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8559b000 r8:8555fdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8555fd80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8555fd80 r8:80287e08 r7:eb6e5e60 r6:8555fe00 r5:8559b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a1fb0 to 0xeb6a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85574b80 INFO: task kworker/0:667:5063 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xdffe1d28 to 0xdffe1d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eb64f000 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) r4:848cab40 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b84b3000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 INFO: task kworker/0:669:5067 blocked for more than 466 seconds. r4:8559c800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb709e08 r5:00001000 r4:eb705000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:00000000 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558d140 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d5f8c r4:854d5c00 r10:61c88647 r9:8559d400 r8:855890ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:671:5071 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:671 state:D stack:0 pid:5071 tgid:5071 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6fdd84 r8:00000002 r7:60000113 r6:eb6fdd8c r5:8559e000 r4:8559e000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8559e000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6fde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558d380 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8559e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb729000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d638c r4:854d6000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d638c r4:85589180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8559e000 r8:855891ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85589180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85589180 r8:80287e08 r7:eb715e60 r6:85589200 r5:8559e000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6fdfb0 to 0xeb6fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8558d080 INFO: task kworker/0:671:5071 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b895b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558d500 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85589280 r8:80287e08 r7:eb6fde60 r6:85589300 r5:8559ec00 r4:8558d200 Call trace: [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:673:5075 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:673 state:D stack:0 pid:5075 tgid:5075 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb739d84 r8:00000002 r7:60000113 r6:eb739d8c r5:85598c00 r4:85598c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85598c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb739e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558d680 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85598c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb741000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d6b8c r4:854d6800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d6b8c r4:85589380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85598c00 r8:855893ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85589380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85589380 r8:80287e08 r7:eb721e60 r6:85589400 r5:85598c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb739fb0 to 0xeb739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8558d300 INFO: task kworker/0:673:5075 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b8d91000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb74d000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85589480 r8:80287e08 r7:eb739e60 r6:85589500 r5:85599800 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:dffe1dc0 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:675:5079 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:675 state:D stack:0 pid:5079 tgid:5079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb751d84 r8:00000002 r7:60000113 r6:eb751d8c r5:855a0000 r4:855a0000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855a0000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb751e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558d940 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb75d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d738c r4:854d7000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d738c r4:85589580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a0000 r8:855895ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85589580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85589580 r8:80287e08 r7:eb745e60 r6:85589600 r5:855a0000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb751fb0 to 0xeb751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8558d6c0 INFO: task kworker/0:675:5079 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b9193000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:676:5081 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:676 state:D stack:0 pid:5081 tgid:5081 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb761d84 r8:00000002 r7:60000113 r6:eb761d8c r5:855a0c00 r4:855a0c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855a0c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb761e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558de00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaa3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d7f8c r4:854d7c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d7f8c r4:85589680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a0c00 r8:855896ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85589680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85589680 r8:80287e08 r7:eb751e60 r6:85589700 r5:855a0c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb761fb0 to 0xeb761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8558d740 INFO: task kworker/0:676:5081 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b94f4000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:eb76dd84 r8:00000002 r7:60000113 r6:eb76dd8c r5:855a1800 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558db00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d778c r4:854d7400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d778c r4:85589780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a1800 r8:855897ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85589780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85589780 r8:80287e08 r7:eb761e60 r6:85589800 r5:855a1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb76dfb0 to 0xeb76dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8558d980 INFO: task kworker/0:677:5083 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b94f4000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:678:5085 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:678 state:D stack:0 pid:5085 tgid:5085 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb779d84 r8:00000002 r7:60000113 r6:eb779d8c r5:855a2400 r4:855a2400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855a2400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb779e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558dc80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa31000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d7b8c r4:854d7800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d7b8c r4:85589880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a2400 r8:855898ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85589880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85589880 r8:80287e08 r7:eb761e60 r6:85589900 r5:855a2400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb779fb0 to 0xeb779ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8558dbc0 INFO: task kworker/0:678:5085 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b98ca000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r5:00001000 r4:eb64f000 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:679:5087 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:679 state:D stack:0 pid:5087 tgid:5087 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5d1d84 r8:00000002 r7:60000113 r6:eb5d1d8c r5:85539800 r4:85539800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85539800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558df40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85539800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0015000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564838c r4:85648000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564838c r4:85589980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85539800 r8:855899ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85589980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85589980 r8:80287e08 r7:eb761e60 r6:85581180 r5:85539800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8558dc00 INFO: task kworker/0:679:5087 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b98ca000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 task:kworker/0:680 state:D stack:0 pid:5089 tgid:5089 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e9e08 r5:00001000 r4:ea937000 r5:85648f8c r4:85648c00 r10:61c88647 r9:8553ec00 r8:85589a2c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8558ddc0 INFO: task kworker/0:680:5089 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b9c57000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:681:5091 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:681 state:D stack:0 pid:5091 tgid:5091 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb635d84 r8:00000002 r7:60000113 r6:eb635d8c r5:85540c00 r4:85540c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85540c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb635e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85614040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85540c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0111000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564878c r4:85648400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564878c r4:85589a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85540c00 r8:85589aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85589a80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85589a80 r8:80287e08 r7:eb5e9e60 r6:85581280 r5:85540c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb635fb0 to 0xeb635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85614080 INFO: task kworker/0:681:5091 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: b9ee7000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:682:5092 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:682 state:D stack:0 pid:5092 tgid:5092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb64dd84 r8:00000002 r7:60000013 r6:eb64dd8c r5:85541800 r4:85541800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85541800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb64de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85614100 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85541800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0593000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85648b8c r4:85648800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85648b8c r4:85589b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85541800 r8:85589b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85589b00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85589b00 r8:80287e08 r7:eb5e9e60 r6:85581300 r5:85541800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb64dfb0 to 0xeb64dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85614100 INFO: task kworker/0:682:5092 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 Workqueue: events bpf_prog_free_deferred r5:85540000 r4:8291a680 r4:00000000 r4:00000000 r5:8564938c r4:85649000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85589b80 r8:80287e08 r7:eb5e9e60 r6:85581380 r5:85540000 INFO: task kworker/0:683:5095 is blocked on a mutex likely owned by task kworker/0:115:3602. 1d20: ba359000 ed6eb000 00000001 80239b98 7f047000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:684:5097 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:684 state:D stack:0 pid:5097 tgid:5097 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb72dd84 r8:00000002 r7:60000013 r6:eb72dd8c r5:855a4800 r4:855a4800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855a4800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb72de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85614740 r4:00000000 r5:00001000 r4:eac6f000 r5:8564978c r4:85649400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85589c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:85d2778c r4:85d27400 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 INFO: task kworker/0:685:5099 blocked for more than 466 seconds. r4:855a3c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb631e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85649b8c r4:85649800 r10:61c88647 r9:855a3c00 r8:85589d2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:686:5101 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:686 state:D stack:0 pid:5101 tgid:5101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb77dd84 r8:00000002 r7:60000113 r6:eb77dd8c r5:855a3000 r4:855a3000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855a3000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb77de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85614bc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaecf000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85649f8c r4:85649c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85649f8c r4:85589e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a3000 r8:85589e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85589e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85589e00 r8:80287e08 r7:eb631e60 r6:85589e80 r5:855a3000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb77dfb0 to 0xeb77dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85614340 INFO: task kworker/0:686:5101 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ba8a8000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:687:5104 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:687 state:D stack:0 pid:5104 tgid:5104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb785d84 r8:00000002 r7:60000113 r6:eb785d8c r5:855a6c00 r4:855a6c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855a6c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb785e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85614dc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf19000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564a38c r4:8564a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564a38c r4:85589f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a6c00 r8:85589f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85589f00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85589f00 r8:80287e08 r7:eb77de60 r6:85589f80 r5:855a6c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb785fb0 to 0xeb785ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85614b00 INFO: task kworker/0:687:5104 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 Exception stack(0xdffe1d28 to 0xdffe1d70) [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:8291a684 r9:eb789d84 r8:00000002 r7:60000013 r6:eb789d8c r5:855a8000 r4:00000000 r4:00000000 r5:8564ab8c r4:8564a800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85619000 r8:80287e08 r7:eb785e60 r6:85619080 r5:855a8000 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: ba8a8000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:689:5108 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:689 state:D stack:0 pid:5108 tgid:5108 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb781d84 r8:00000002 r7:60000113 r6:eb781d8c r5:855a8c00 r4:855a8c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855a8c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb781e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85614f80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564a78c r4:8564a400 r7:dddced80 r6:83018000 r5:8564a78c r4:85619100 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 INFO: task kworker/0:690:5111 blocked for more than 466 seconds. r4:855aa400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb78de08 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8564af8c r4:8564ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564af8c r4:85619200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855aa400 r8:8561922c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85619200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619200 r8:80287e08 r7:eb789e60 r6:85619280 r5:855aa400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb78dfb0 to 0xeb78dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8561f100 INFO: task kworker/0:690:5111 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: baeb7000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:691:5112 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:691 state:D stack:0 pid:5112 tgid:5112 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb791d84 r8:00000002 r7:60000113 r6:eb791d8c r5:855ab000 r4:855ab000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb03b000 r5:8564b38c r4:8564b000 r7:dddced80 r6:83018000 r5:8564b38c r4:85619300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ab000 r8:8561932c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85619300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619300 r8:80287e08 r7:eb78de60 r6:85619380 r5:855ab000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb791fb0 to 0xeb791ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8561f1c0 INFO: task kworker/0:691:5112 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: baeb7000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:692:5115 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:692 state:D stack:0 pid:5115 tgid:5115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb799d84 r8:00000002 r7:60000013 r6:eb799d8c r5:855a9800 r4:855a9800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855a9800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb799e08 r4:00000000 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564b78c r4:8564b400 r7:dddced80 r6:83018000 r5:8564b78c r4:85619400 r10:00000000 r9:85619400 r8:80287e08 r7:eb791e60 r6:85619480 r5:855a9800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xdffe1d28 to 0xdffe1d70) [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:304:5117 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:304 state:D stack:0 pid:5117 tgid:5117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb79dd84 r8:00000002 r7:60000113 r6:eb79dd8c r5:855ad400 r4:855ad400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ad400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb79de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856453c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:855ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae71000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8442c38c r4:8442c000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8442c38c r4:85581400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ad400 r8:8558142c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85581400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85581400 r8:80287e08 r7:eb57de60 r6:85619500 r5:855ad400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb79dfb0 to 0xeb79dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:855889c0 INFO: task kworker/1:304:5117 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bb4bc000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:848cab40 task:kworker/0:693 state:D stack:0 pid:5118 tgid:5118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb795d84 r8:00000002 r7:60000013 r6:eb795d8c r5:855ac800 r4:855ac800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ac800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb795e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561f980 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1af000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564bb8c r4:8564b800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564bb8c r4:85619580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ac800 r8:856195ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85619580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619580 r8:80287e08 r7:eb799e60 r6:85619600 r5:855ac800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb795fb0 to 0xeb795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8561f400 INFO: task kworker/0:693:5118 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bb4bc000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:694:5120 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:694 state:D stack:0 pid:5120 tgid:5120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7a5d84 r8:00000002 r7:60000013 r6:eb7a5d8c r5:855aec00 r4:855aec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855aec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561fd00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb27b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565038c r4:85650000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565038c r4:85619680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855aec00 r8:856196ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85619680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619680 r8:80287e08 r7:eb795e60 r6:85619700 r5:855aec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a5fb0 to 0xeb7a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8561f940 INFO: task kworker/0:694:5120 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bb982000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:695:5122 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:695 state:D stack:0 pid:5122 tgid:5122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7a1d84 r8:00000002 r7:60000013 r6:eb7a1d8c r5:855abc00 r4:855abc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855abc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561fc00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb241000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564bf8c r4:8564bc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564bf8c r4:85619780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855abc00 r8:856197ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85619780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619780 r8:80287e08 r7:eb7a5e60 r6:85619800 r5:855abc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a1fb0 to 0xeb7a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8561fa80 INFO: task kworker/0:695:5122 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bb982000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8565078c r4:85650400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:696:5124 is blocked on a mutex likely owned by task kworker/0:115:3602. r4:00000000 1d20: bb982000 ed6eb000 00000001 80239b98 7f047000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r5:00001000 r4:eb64f000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:697 state:D stack:0 pid:5126 tgid:5126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7add84 r8:00000002 r7:60000013 r6:eb7add8c r5:855a5400 r4:855a5400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855a5400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ade08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85614680 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb357000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85650b8c r4:85650800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85650b8c r4:85619980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a5400 r8:856199ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85619980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619980 r8:80287e08 r7:eb479e60 r6:85619a00 r5:855a5400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7adfb0 to 0xeb7adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8561fd40 INFO: task kworker/0:697:5126 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bbe5c000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:698:5129 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:698 state:D stack:0 pid:5129 tgid:5129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7b5d84 r8:00000002 r7:60000013 r6:eb7b5d8c r5:84b19800 r4:84b19800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b19800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85620300 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b19800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb36d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85650f8c r4:85650c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85650f8c r4:85619a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b19800 r8:85619aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85619a80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619a80 r8:80287e08 r7:eb7ade60 r6:85619b00 r5:84b19800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7b5fb0 to 0xeb7b5ff8) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) r4:848cab40 Workqueue: events bpf_prog_free_deferred r5:84b1a400 r4:8291a680 r4:00000000 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:85661f8c r4:85661c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85588240 INFO: task kworker/1:305:5130 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bc2a1000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:699:5132 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:699 state:D stack:0 pid:5132 tgid:5132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7bdd84 r8:00000002 r7:60000113 r6:eb7bdd8c r5:84b18c00 r4:84b18c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b18c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7bde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85620580 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b18c00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb385000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565138c r4:85651000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565138c r4:85619c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b18c00 r8:85619c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85619c00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619c00 r8:80287e08 r7:eb7b5e60 r6:85619c80 r5:84b18c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7bdfb0 to 0xeb7bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856200c0 INFO: task kworker/0:699:5132 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bc2e3000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:700:5133 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:700 state:D stack:0 pid:5133 tgid:5133 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:eb7c1d84 r8:00000002 r7:60000013 r6:eb7c1d8c r5:84b1bc00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85620800 r5:8565178c r4:85651400 r7:dddced80 r6:83018000 r5:8565178c r4:85619d00 r10:00000000 r9:85619d00 r8:80287e08 r7:eb7bde60 r6:85619d80 r5:84b1bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r5:80070013 r4:80239bb0 r4:dffe1dc0 r5:00001000 r4:eb64f000 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:701:5135 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:701 state:D stack:0 pid:5135 tgid:5135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7c5d84 r8:00000002 r7:60000013 r6:eb7c5d8c r5:84b1c800 r4:84b1c800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b1c800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856209c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b1c800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3ab000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85651b8c r4:85651800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85651b8c r4:85619e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b1c800 r8:85619e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85619e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619e00 r8:80287e08 r7:eb7c1e60 r6:85619e80 r5:84b1c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7c5fb0 to 0xeb7c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85620680 INFO: task kworker/0:701:5135 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bc672000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:702:5138 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:702 state:D stack:0 pid:5138 tgid:5138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7c9d84 r8:00000002 r7:60000113 r6:eb7c9d8c r5:84b1b000 r4:84b1b000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b1b000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85620840 r9:83018005 r8:84b1b000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 r5:85651f8c r4:85651c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85619f00 r8:80287e08 r7:eb7c5e60 r6:85619f80 r5:84b1b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r4:84b1d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b1e08 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8565238c r4:85652000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565238c r4:8561d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b1d400 r8:8561d02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561d000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561d000 r8:80287e08 r7:eb7c9e60 r6:8561d080 r5:84b1d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7b1fb0 to 0xeb7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85620a40 INFO: task kworker/0:703:5140 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bcbad000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:704:5142 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:704 state:D stack:0 pid:5142 tgid:5142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7a9d84 r8:00000002 r7:60000013 r6:eb7a9d8c r5:84b1e000 r4:84b1e000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b1e000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85620e40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b1e000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb475000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565278c r4:85652400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565278c r4:8561d100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b1e000 r8:8561d12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561d100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561d100 r8:80287e08 r7:eb7b1e60 r6:8561d180 r5:84b1e000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a9fb0 to 0xeb7a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:704:5142 is blocked on a mutex likely owned by task kworker/0:115:3602. 1d60: 80230ad0 80239bb0 80070013 ffffffff [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:eb64f000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eb7cdd84 r8:00000002 r7:60000113 r6:eb7cdd8c r5:84b1ec00 r4:84b1ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b1ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7cde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856143c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b1ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4ad000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85652f8c r4:85652c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85652f8c r4:8561d200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b1ec00 r8:8561d22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561d200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561d200 r8:80287e08 r7:eb7a9e60 r6:8561d280 r5:84b1ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7cdfb0 to 0xeb7cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85620cc0 INFO: task kworker/0:705:5144 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bce9d000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:706:5146 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:706 state:D stack:0 pid:5146 tgid:5146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:84b18000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d1e08 r4:00000000 r5:85652b8c r4:85652800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b18000 r8:8561d32c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:707:5148 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:707 state:D stack:0 pid:5148 tgid:5148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7d5d84 r8:00000002 r7:60000013 r6:eb7d5d8c r5:855a6000 r4:855a6000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855a6000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85625040 r5:8565338c r4:85653000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565338c r4:8561d400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a6000 r8:8561d42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561d400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561d400 r8:80287e08 r7:eb7cde60 r6:8561d480 r5:855a6000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d5fb0 to 0xeb7d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:842381c0 INFO: task kworker/0:707:5148 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bd555000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:708:5151 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:708 state:D stack:0 pid:5151 tgid:5151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7d9d84 r8:00000002 r7:60000113 r6:eb7d9d8c r5:855b0000 r4:855b0000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855b0000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d9e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8565378c r4:85653400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8561d500 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:848d9e00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:709 state:D stack:0 pid:5152 tgid:5152 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85625480 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb579000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85653b8c r4:85653800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85653b8c r4:8561d600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b0c00 r8:8561d62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561d600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561d600 r8:80287e08 r7:eb7d9e60 r6:8561d680 r5:855b0c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7ddfb0 to 0xeb7ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856251c0 INFO: task kworker/0:709:5152 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bd62b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:710:5154 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:710 state:D stack:0 pid:5154 tgid:5154 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:855b1800 r4:8291a680 r4:00000000 r9:83018005 r8:855b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r5:85653f8c r4:85653c00 r10:00000000 r9:8561d700 r8:80287e08 r7:eb7dde60 r6:8561d780 r5:855b1800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: bda53000 ed6eb000 00000001 80239b98 7f047000 00000001 r4:dffe1dc0 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eb7edd84 r8:00000002 r7:60000113 r6:eb7edd8c r5:85543000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb5f5000 r5:85660f8c r4:85660c00 r7:dddced80 r6:83018000 r5:85660f8c r4:8561d800 r10:00000000 r9:8561d800 r8:80287e08 r7:eb7e1e60 r6:85581500 r5:85543000 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85625440 INFO: task kworker/0:711:5156 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bda53000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:712:5158 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:712 state:D stack:0 pid:5158 tgid:5158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7f5d84 r8:00000002 r7:60000013 r6:eb7f5d8c r5:85546000 r4:85546000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85546000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb5ad000 r5:8566038c r4:85660000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85546000 r8:8561d8ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 Workqueue: events bpf_prog_free_deferred r5:85546c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85625880 r5:8566078c r4:85660400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85546c00 r8:8561d92c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:714:5161 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:714 state:D stack:0 pid:5161 tgid:5161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb801d84 r8:00000002 r7:60000113 r6:eb801d8c r5:85545400 r4:85545400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85545400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb801e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856259c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85545400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5d9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85660b8c r4:85660800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85660b8c r4:8561d980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85545400 r8:8561d9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561d980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561d980 r8:80287e08 r7:eb7ede60 r6:85581680 r5:85545400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb801fb0 to 0xeb801ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85625680 INFO: task kworker/0:714:5161 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bdfc5000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:715:5164 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:715 state:D stack:0 pid:5164 tgid:5164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb80dd84 r8:00000002 r7:60000013 r6:eb80dd8c r5:85544800 r4:85544800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85544800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb80de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85625c40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85544800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb605000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566138c r4:85661000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566138c r4:8561da00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85544800 r8:8561da2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561da00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561da00 r8:80287e08 r7:eb7ede60 r6:85581700 r5:85544800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb80dfb0 to 0xeb80dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85625840 INFO: task kworker/0:715:5164 is blocked on a mutex likely owned by task kworker/0:115:3602. Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred r5:85543c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85625e00 r5:8566178c r4:85661400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8561da80 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: be2ee000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:717:5168 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:717 state:D stack:0 pid:5168 tgid:5168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb819d84 r8:00000002 r7:60000013 r6:eb819d8c r5:8552ec00 r4:8552ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8552ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb819e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85625f00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8552ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb629000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85661b8c r4:85661800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85661b8c r4:8561db00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8552ec00 r8:8561db2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561db00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:718:5170 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:718 state:D stack:0 pid:5170 tgid:5170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7e9d84 r8:00000002 r7:60000013 r6:eb7e9d8c r5:855b3c00 r4:855b3c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855b3c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563b400 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb825000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566278c r4:85662400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566278c r4:8561db80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b3c00 r8:8561dbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561db80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561db80 r8:80287e08 r7:eb819e60 r6:8561dc00 r5:855b3c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7e9fb0 to 0xeb7e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85625c80 INFO: task kworker/0:718:5170 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: be61d000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) r4:848cab40 Not tainted 6.15.0-rc5-syzkaller #0 r4:855b5400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb829e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8566238c r4:85662000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8561dc80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffe1d28 to 0xdffe1d70) [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:85d2778c r4:85d27400 r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) r4:848cab40 Workqueue: events bpf_prog_free_deferred r5:855b6000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85627cc0 r5:8442cb8c r4:8442c800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b6000 r8:855818ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85581880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85581880 r8:80287e08 r7:eb79de60 r6:8561dd80 r5:855b6000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb835fb0 to 0xeb835ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85627d80 INFO: task kworker/1:306:5175 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: beabb000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:720:5176 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:720 state:D stack:0 pid:5176 tgid:5176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb815d84 r8:00000002 r7:60000113 r6:eb815d8c r5:855b6c00 r4:855b6c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855b6c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb815e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563b940 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb83d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85662f8c r4:85662c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85662f8c r4:8561de00 r4:8561de00 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r5:00001000 r4:eb64f000 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb845d84 r8:00000002 r7:60000013 r6:eb845d8c r5:855b2400 r4:855b2400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855b2400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb845e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563b600 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb831000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85662b8c r4:85662800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85662b8c r4:8561df00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b2400 r8:8561df2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561df00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561df00 r8:80287e08 r7:eb815e60 r6:8561df80 r5:855b2400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb845fb0 to 0xeb845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8563b480 INFO: task kworker/0:721:5178 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bee49000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r4:85542400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb851e08 r9:83018005 r8:85542400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 r5:8566378c r4:85663400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85542400 r8:8563902c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 1d60: 80230ad0 80239bb0 80070013 ffffffff [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:723:5181 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:723 state:D stack:0 pid:5181 tgid:5181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb85dd84 r8:00000002 r7:60000113 r6:eb85dd8c r5:855b3000 r4:855b3000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855b3000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb85de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563bd40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfca5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566338c r4:85663000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566338c r4:85639100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b3000 r8:8563912c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85639100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85639100 r8:80287e08 r7:eb851e60 r6:85639180 r5:855b3000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb85dfb0 to 0xeb85dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8563b980 INFO: task kworker/0:723:5181 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:848d9e00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85548000 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856452c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85548000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacfb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8442c78c r4:8442c400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8442c78c r4:85581900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85548000 r8:8558192c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85581900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85581900 r8:80287e08 r7:eb79de60 r6:85581980 r5:85548000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb809fb0 to 0xeb809ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:724:5187 blocked for more than 467 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb869e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85640d80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85548c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb67d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85669f8c r4:85669c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85669f8c r4:85639200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85548c00 r8:8563922c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85639200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85639200 r8:80287e08 r7:eb851e60 r6:85581a00 r5:85548c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb869fb0 to 0xeb869ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8563bc40 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eb64f000 r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:85663b8c r4:85663800 r4:85639280 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 Exception stack(0xdffe1fb0 to 0xdffe1ff8) r4:8554bc00 r4:00000000 r5:85663f8c r4:85663c00 r10:61c88647 r9:8554bc00 r8:8563932c r7:82804d40 r6:dddced80 r5:dddceda0 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: bfb45000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:848d9e00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8566838c r4:85668000 r4:85639380 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:00000000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:728:5195 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:728 state:D stack:0 pid:5195 tgid:5195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb889d84 r8:00000002 r7:60000113 r6:eb889d8c r5:85549800 r4:85549800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85549800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb889e08 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8566878c r4:85668400 r4:85639400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:729:5196 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:729 state:D stack:0 pid:5196 tgid:5196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb88de08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85640200 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:00001000 r4:eb64f000 r4:848d9e00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb891e08 r5:85668f8c r4:85668c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8554a400 r8:8563952c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85639500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85639500 r8:80287e08 r7:eb869e60 r6:85581d00 r5:8554a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb891fb0 to 0xeb891ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85640200 INFO: task kworker/0:730:5197 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c03a0000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:848d9e00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8554ec00 r4:00000000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb193000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8441578c r4:84415400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8441578c r4:85581d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8554ec00 r8:85581dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85581d80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85581d80 r8:80287e08 r7:eb79de60 r6:85581e00 r5:8554ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb861fb0 to 0xeb861ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856451c0 INFO: task kworker/1:308:5200 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c063c000 ed6eb000 00000001 80239b98 7f047000 00000001 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:dffe1dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:848d9e00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8442bf8c r4:8442bc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8554d400 r8:85581eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:00000000 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r5:85d2778c r4:85d27400 r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85550c00 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566938c r4:85669000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566938c r4:85639580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85550c00 r8:856395ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85639580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85639580 r8:80287e08 r7:eb869e60 r6:85581f80 r5:85550c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb89dfb0 to 0xeb89dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85640500 INFO: task kworker/0:731:5204 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c0864000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:732:5206 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:732 state:D stack:0 pid:5206 tgid:5206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb895d84 r8:00000002 r7:60000013 r6:eb895d8c r5:85551800 r4:85551800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85551800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb895e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:00001000 r4:eb557000 r5:8566978c r4:85669400 r7:dddced80 r6:83018000 r5:8566978c r4:85639600 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:dffe1dc0 r5:00001000 r4:eb64f000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85645a40 r5:855e438c r4:855e4000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85641080 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c0cb0000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:311:5210 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:311 state:D stack:0 pid:5210 tgid:5210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8a1d84 r8:00000002 r7:60000113 r6:eb8a1d8c r5:85553000 r4:85553000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85553000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d6e00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85553000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb649000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e678c r4:855e6400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e678c r4:85641180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85553000 r8:856411ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85641180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85641180 r8:80287e08 r7:eb899e60 r6:85641200 r5:85553000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:dffe1dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:312 state:D stack:0 pid:5212 tgid:5212 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85645bc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85553c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb521000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e478c r4:855e4400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e478c r4:85641280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85553c00 r8:856412ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85641280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85641280 r8:80287e08 r7:eb8a1e60 r6:85641300 r5:85553c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8a5fb0 to 0xeb8a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856459c0 INFO: task kworker/1:312:5212 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c10df000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:313:5214 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:313 state:D stack:0 pid:5214 tgid:5214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8add84 r8:00000002 r7:60000113 r6:eb8add8c r5:85554800 r4:85554800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e4f8c r4:855e4c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e4f8c r4:85641380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85554800 r8:856413ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85641380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85641380 r8:80287e08 r7:eb8a1e60 r6:85641400 r5:85554800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8adfb0 to 0xeb8adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856459c0 INFO: task kworker/1:313:5214 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c10df000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb665000 r5:85669b8c r4:85669800 r10:61c88647 r9:85555400 r8:856396ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:8291a684 r9:eb8b5d84 r8:00000002 r7:60000113 r6:eb8b5d8c r5:85556000 r4:00000000 r4:00000000 r5:00001000 r4:eb69d000 r5:8566a38c r4:8566a000 r10:61c88647 r9:85556000 r8:8563972c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85640a40 INFO: task kworker/0:734:5219 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c1506000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:735:5221 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:735 state:D stack:0 pid:5221 tgid:5221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8bdd84 r8:00000002 r7:60000113 r6:eb8bdd8c r5:85550000 r4:85550000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85550000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8bde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85640f80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85550000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8566a78c r4:8566a400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:85d2778c r4:85d27400 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:8291a684 r9:eb8c5d84 r8:00000002 r7:60000113 r6:eb8c5d8c r5:85688c00 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8566ab8c r4:8566a800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85639800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:737:5225 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:737 state:D stack:0 pid:5225 tgid:5225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8cdd84 r8:00000002 r7:60000113 r6:eb8cdd8c r5:8568a400 r4:8568a400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8568a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8cde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563c040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8568a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb70b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566b78c r4:8566b400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566b78c r4:85639880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8568a400 r8:856398ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85639880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85639880 r8:80287e08 r7:eb8c5e60 r6:85641680 r5:8568a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8cdfb0 to 0xeb8cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84238940 INFO: task kworker/0:737:5225 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c1c81000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:738:5227 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:eb8d5d84 r8:00000002 r7:60000113 r6:eb8d5d8c r5:85688000 r4:00000000 r4:00000000 r5:8566af8c r4:8566ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb8d5fb0 to 0xeb8d5ff8) r4:85640840 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:739 state:D stack:0 pid:5228 tgid:5228 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d9e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6f7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566b38c r4:8566b000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566b38c r4:85639980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85689800 r8:856399ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85639980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85639980 r8:80287e08 r7:eb8cde60 r6:85641780 r5:85689800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8d9fb0 to 0xeb8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85627340 INFO: task kworker/0:739:5228 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c217f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:740:5230 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:740 state:D stack:0 pid:5230 tgid:5230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8e1d84 r8:00000002 r7:60000013 r6:eb8e1d8c r5:8568c800 r4:8568c800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8568c800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563c580 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8568c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb73b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566c38c r4:8566c000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566c38c r4:85639a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8568c800 r8:85639a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85639a00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85639a00 r8:80287e08 r7:eb8cde60 r6:85641800 r5:8568c800 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eb64f000 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:8566bb8c r4:8566b800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566bb8c r4:85639a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8568b000 r8:85639aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85639a80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85639a80 r8:80287e08 r7:eb8e1e60 r6:85641880 r5:8568b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8e9fb0 to 0xeb8e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8563c1c0 INFO: task kworker/0:741:5232 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c2252000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:743:5237 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:743 state:D stack:0 pid:5237 tgid:5237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8f1d84 r8:00000002 r7:60000013 r6:eb8f1d8c r5:8568e000 r4:8568e000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8568e000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:8566c78c r4:8566c400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8568e000 r8:85639bac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8566cb8c r4:8566c800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85639c00 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8563c540 INFO: task kworker/0:744:5239 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c29ac000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:745:5240 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:745 state:D stack:0 pid:5240 tgid:5240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8f9d84 r8:00000002 r7:60000013 r6:eb8f9d8c r5:8568d400 r4:8568d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8568d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f9e08 r9:83018005 r8:8568d400 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 r5:8566cf8c r4:8566cc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85639c80 r8:80287e08 r7:eb8f5e60 r6:85641a80 r5:8568d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:746:5243 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:746 state:D stack:0 pid:5243 tgid:5243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb855d84 r8:00000002 r7:60000013 r6:eb855d8c r5:85556c00 r4:85556c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85556c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb855e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563ca80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85556c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd91000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566d38c r4:8566d000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566d38c r4:85639d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85556c00 r8:85639d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85639d00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85639d00 r8:80287e08 r7:eb8f9e60 r6:85641b00 r5:85556c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb855fb0 to 0xeb855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8563c740 INFO: task kworker/0:746:5243 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c3178000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:747:5245 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:747 state:D stack:0 pid:5245 tgid:5245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8fdd84 r8:00000002 r7:60000113 r6:eb8fdd8c r5:85690000 r4:85690000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85690000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8fde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563cbc0 r4:00000000 r5:00001000 r4:e0107000 r5:8566d78c r4:8566d400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85639d80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffe1d28 to 0xdffe1d70) [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:85d2778c r4:85d27400 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:748:5247 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:748 state:D stack:0 pid:5247 tgid:5247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb901d84 r8:00000002 r7:60000113 r6:eb901d8c r5:85690c00 r4:85690c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85690c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb901e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563cd00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85690c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4801000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566db8c r4:8566d800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566db8c r4:85639e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85690c00 r8:85639e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85639e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85639e00 r8:80287e08 r7:eb8fde60 r6:85641c00 r5:85690c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb901fb0 to 0xeb901ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8563ca40 INFO: task kworker/0:748:5247 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c3178000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:749:5249 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:749 state:D stack:0 pid:5249 tgid:5249 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: r4:85691800 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:85691800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 r5:8566df8c r4:8566dc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85691800 r8:85639eac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c3565000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:750:5251 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:750 state:D stack:0 pid:5251 tgid:5251 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb909d84 r8:00000002 r7:60000013 r6:eb909d8c r5:85692400 r4:85692400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85692400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb909e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563cf80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85692400 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac4f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566e38c r4:8566e000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566e38c r4:85639f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85692400 r8:85639f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85639f00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85639f00 r8:80287e08 r7:eb905e60 r6:85641d00 r5:85692400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb909fb0 to 0xeb909ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8563cb00 INFO: task kworker/0:750:5251 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85693000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 r5:8566e78c r4:8566e400 r10:61c88647 r9:85693000 r8:85639fac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:752:5255 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:752 state:D stack:0 pid:5255 tgid:5255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb911d84 r8:00000002 r7:60000013 r6:eb911d8c r5:85693c00 r4:85693c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85693c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb911e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84238ac0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85693c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae13000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566eb8c r4:8566e800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566eb8c r4:85684000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85693c00 r8:8568402c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85684000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85684000 r8:80287e08 r7:eb90de60 r6:85641e00 r5:85693c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb911fb0 to 0xeb911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8563cd80 INFO: task kworker/0:752:5255 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c39a4000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:753:5256 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:753 state:D stack:0 pid:5256 tgid:5256 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb915d84 r8:00000002 r7:60000113 r6:eb915d8c r5:85694800 r4:85694800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85694800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb915e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85642240 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85694800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb039000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566ef8c r4:8566ec00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566ef8c r4:85684080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85694800 r8:856840ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85684080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85684080 r8:80287e08 r7:eb911e60 r6:85641e80 r5:85694800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb915fb0 to 0xeb915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:842389c0 INFO: task kworker/0:753:5256 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c39a4000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85695400 r5:85695400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563cfc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85695400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafd5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e538c r4:855e5000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e538c r4:85641f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85695400 r8:85641f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85641f00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85641f00 r8:80287e08 r7:eb8a1e60 r6:85641f80 r5:85695400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8a9fb0 to 0xeb8a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8563cec0 INFO: task kworker/1:314:5260 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c3acf000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:315:5262 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:315 state:D stack:0 pid:5262 tgid:5262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8b9d84 r8:00000002 r7:60000113 r6:eb8b9d8c r5:85696000 r4:85696000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85696000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85685600 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85696000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85696000 r8:8563d02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r4:dffe1dc0 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:754:5264 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:754 state:D stack:0 pid:5264 tgid:5264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb91dd84 r8:00000002 r7:60000113 r6:eb91dd8c r5:85698000 r4:85698000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85698000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb91de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85642340 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85698000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566f38c r4:8566f000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566f38c r4:85684100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85698000 r8:8568412c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85684100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85684100 r8:80287e08 r7:eb915e60 r6:8563d100 r5:85698000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb91dfb0 to 0xeb91dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856420c0 INFO: task kworker/0:754:5264 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c3f31000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:755:5266 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:755 state:D stack:0 pid:5266 tgid:5266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb925d84 r8:00000002 r7:60000113 r6:eb925d8c r5:85699800 r4:85699800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85699800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb925e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85642880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85699800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb355000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567038c r4:85670000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85699800 r8:856841ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r4:dffe1dc0 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 Workqueue: events bpf_prog_free_deferred r5:8569a400 r4:8291a680 r4:00000000 r4:00000000 r5:8566f78c r4:8566f400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8569a400 r8:8568422c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85684200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85684200 r8:80287e08 r7:eb925e60 r6:8563d200 r5:8569a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb929fb0 to 0xeb929ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85642140 INFO: task kworker/0:756:5267 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c4175000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:757:5269 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:757 state:D stack:0 pid:5269 tgid:5269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb92dd84 r8:00000002 r7:60000013 r6:eb92dd8c r5:85698c00 r4:85698c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85698c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb92de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85642600 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85698c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb28d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566fb8c r4:8566f800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566fb8c r4:85684280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85698c00 r8:856842ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85684280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85684280 r8:80287e08 r7:eb925e60 r6:8563d280 r5:85698c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb92dfb0 to 0xeb92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856422c0 INFO: task kworker/0:757:5269 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c43c5000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:316:5271 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:316 state:D stack:0 pid:5271 tgid:5271 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb935d84 r8:00000002 r7:60000113 r6:eb935d8c r5:8569c800 r4:8569c800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8569c800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb935e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85685dc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8569c800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4dd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e5b8c r4:855e5800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e5b8c r4:8563d300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8569c800 r8:8563d32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8563d300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8563d300 r8:80287e08 r7:eb8a1e60 r6:8563d380 r5:8569c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb935fb0 to 0xeb935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85685580 INFO: task kworker/1:316:5271 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c43c5000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:00001000 r4:eb64f000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:758 state:D stack:0 pid:5273 tgid:5273 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85642740 r5:8566ff8c r4:8566fc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:dffe1dc0 r5:00001000 r4:eb64f000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:759:5275 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:759 state:D stack:0 pid:5275 tgid:5275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb945d84 r8:00000002 r7:60000113 r6:eb945d8c r5:8569b000 r4:8569b000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8569b000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb945e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85642b40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8569b000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb38f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85670b8c r4:85670800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85670b8c r4:85684380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8569b000 r8:856843ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85684380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85684380 r8:80287e08 r7:eb925e60 r6:8563d480 r5:8569b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb945fb0 to 0xeb945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856425c0 INFO: task kworker/0:759:5275 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c4fd4000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 r9:83018005 r8:8569ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r5:8567078c r4:85670400 r4:85684400 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85642700 INFO: task kworker/0:760:5277 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c544b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:761:5280 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:761 state:D stack:0 pid:5280 tgid:5280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb955d84 r8:00000002 r7:60000113 r6:eb955d8c r5:8569e000 r4:8569e000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8569e000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb955e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85642c80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8569e000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85670f8c r4:85670c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85670f8c r4:85684480 r10:61c88647 r9:8569e000 r8:856844ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:762:5281 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:762 state:D stack:0 pid:5281 tgid:5281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb959d84 r8:00000002 r7:60000113 r6:eb959d8c r5:85696c00 r4:85696c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85696c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb959e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85642900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85696c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85671b8c r4:85671800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85642940 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r4:dffe1dc0 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:8291a684 r9:eb961d84 r8:00000002 r7:60000013 r6:eb961d8c r5:856a0c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb961e08 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r9:83018005 r8:856a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r5:8567138c r4:85671000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c5b86000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:764:5285 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:764 state:D stack:0 pid:5285 tgid:5285 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb969d84 r8:00000002 r7:60000113 r6:eb969d8c r5:856a0000 r4:856a0000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856a0000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb969e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85642f00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb407000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567178c r4:85671400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567178c r4:85684600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856a0000 r8:8568462c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85684600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85684600 r8:80287e08 r7:eb959e60 r6:8563d700 r5:856a0000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb969fb0 to 0xeb969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85642c00 INFO: task kworker/0:764:5285 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:80070013 r4:80239bb0 r4:00000000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb971e08 r9:83018005 r8:856a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 r5:85671f8c r4:85671c00 r10:61c88647 r9:856a3000 r8:856846ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: c647a000 ed6eb000 00000001 80239b98 7f047000 00000001 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:766:5289 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:766 state:D stack:0 pid:5289 tgid:5289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb979d84 r8:00000002 r7:60000013 r6:eb979d8c r5:856a3c00 r4:856a3c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856a3c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb979e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d13c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb56f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567238c r4:85672000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567238c r4:85684700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856a3c00 r8:8568472c r7:82804d40 r6:dddced80 r5:dddceda0 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:856d1080 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r4:00000000 r5:85d2778c r4:85d27400 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 INFO: task kworker/0:767:5292 blocked for more than 468 seconds. r10:8291a684 r9:eb949d84 r8:00000002 r7:60000113 r6:eb949d8c r5:856a2400 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r9:83018005 r8:856a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 r5:8567278c r4:85672400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:856a2400 r8:856847ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:317:5293 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:317 state:D stack:0 pid:5293 tgid:5293 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb97dd84 r8:00000002 r7:60000113 r6:eb97dd8c r5:856a4800 r4:856a4800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856a4800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb97de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d6040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:856a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb591000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e5f8c r4:855e5c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e5f8c r4:8563d900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856a4800 r8:8563d92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8563d900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8563d900 r8:80287e08 r7:eb8a1e60 r6:8563d980 r5:856a4800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb97dfb0 to 0xeb97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85685f40 INFO: task kworker/1:317:5293 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r5:85d2778c r4:85d27400 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:768:5297 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:768 state:D stack:0 pid:5297 tgid:5297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb975d84 r8:00000002 r7:60000113 r6:eb975d8c r5:856a5400 r4:856a5400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856a5400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb975e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d1680 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe6b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85672b8c r4:85672800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85672b8c r4:85684800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856a5400 r8:8568482c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85684800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85684800 r8:80287e08 r7:eb949e60 r6:8563da00 r5:856a5400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb975fb0 to 0xeb975ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856d1140 INFO: task kworker/0:768:5297 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 Exception stack(0xdffe1d28 to 0xdffe1d70) r5:80070013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:00000000 r5:00001000 r4:eb64f000 r5:85d2778c r4:85d27400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:769:5299 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:769 state:D stack:0 pid:5299 tgid:5299 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb771d84 r8:00000002 r7:60000013 r6:eb771d8c r5:856a6000 r4:856a6000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856a6000 r4:8291a680 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e05ef000 r5:85672f8c r4:85672c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85672f8c r4:85684880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85684880 r8:80287e08 r7:eb975e60 r6:8563da80 r5:856a6000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r5:85d2778c r4:85d27400 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fa0: 00000000 00000000 00000000 00000000 r4:848cab40 Not tainted 6.15.0-rc5-syzkaller #0 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:856a6c00 r4:8291a680 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r9:83018005 r8:856a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07f7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567338c r4:85673000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567338c r4:85684900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856a6c00 r8:8568492c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85684900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85684900 r8:80287e08 r7:eb771e60 r6:8563db00 r5:856a6c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb879fb0 to 0xeb879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856d1640 INFO: task kworker/0:770:5301 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c6f35000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:771:5302 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:771 state:D stack:0 pid:5302 tgid:5302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb881d84 r8:00000002 r7:60000113 r6:eb881d8c r5:856a1800 r4:856a1800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856a1800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb881e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d1ac0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab5f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567378c r4:85673400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567378c r4:85684980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856a1800 r8:856849ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85684980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85684980 r8:80287e08 r7:eb879e60 r6:8563db80 r5:856a1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb881fb0 to 0xeb881ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856d1780 INFO: task kworker/0:771:5302 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c7229000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:8291a684 r9:eb8e5d84 r8:00000002 r7:60000013 r6:eb8e5d8c r5:8569d400 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:85673b8c r4:85673800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:856a8000 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r9:83018205 r8:856a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85674b8c r4:85674800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85674b8c r4:8563dc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856a8000 r8:8563dcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8563dc80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8563dc80 r8:80287e08 r7:eb8a1e60 r6:8563dd00 r5:856a8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb985fb0 to 0xeb985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856d6440 INFO: task kworker/1:318:5307 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c75cc000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:773:5309 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:773 state:D stack:0 pid:5309 tgid:5309 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb989d84 r8:00000002 r7:60000013 r6:eb989d8c r5:856a8c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r9:83018005 r8:856a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb18d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567478c r4:85674400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567478c r4:85684a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856a8c00 r8:85684aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85684a80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85684a80 r8:80287e08 r7:eb8e5e60 r6:8563dd80 r5:856a8c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb989fb0 to 0xeb989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856d1b00 INFO: task kworker/0:773:5309 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c75cc000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:774:5311 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:774 state:D stack:0 pid:5311 tgid:5311 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb98dd84 r8:00000002 r7:60000113 r6:eb98dd8c r5:856a9800 r4:856a9800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856a9800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb98de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d1d40 r5:85673f8c r4:85673c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85684b00 Exception stack(0xeb98dfb0 to 0xeb98dff8) Workqueue: events bpf_prog_free_deferred 1d20: c75cc000 ed6eb000 00000001 80239b98 7f047000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:775:5313 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:775 state:D stack:0 pid:5313 tgid:5313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb991d84 r8:00000002 r7:60000013 r6:eb991d8c r5:856aa400 r4:856aa400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856aa400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb991e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d1ec0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567438c r4:85674000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:dffe1dc0 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:848cab40 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:856ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 r5:85674f8c r4:85674c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85674f8c r4:85684c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ab000 r8:85684c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85684c00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85684c00 r8:80287e08 r7:eb989e60 r6:8563df00 r5:856ab000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb995fb0 to 0xeb995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856d1e80 INFO: task kworker/0:776:5315 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c7cf7000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:319:5317 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:856abc00 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:855e738c r4:855e7000 r4:8563df80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:777:5319 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:777 state:D stack:0 pid:5319 tgid:5319 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb99dd84 r8:00000002 r7:60000113 r6:eb99dd8c r5:856ac800 r4:856ac800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856ac800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb99de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ca040 r9:83018005 r8:856ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 r5:8567538c r4:85675000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567538c r4:85684c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ac800 r8:85684cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85684c80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85684c80 r8:80287e08 r7:eb995e60 r6:856cf080 r5:856ac800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb99dfb0 to 0xeb99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84238940 INFO: task kworker/0:777:5319 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c803b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:778:5322 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:778 state:D stack:0 pid:5322 tgid:5322 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9a9d84 r8:00000002 r7:60000113 r6:eb9a9d8c r5:856aec00 r4:856aec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856aec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ca280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5b7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567578c r4:85675400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567578c r4:85684d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856aec00 r8:85684d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85684d00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85684d00 r8:80287e08 r7:eb99de60 r6:856cf100 r5:856aec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a9fb0 to 0xeb9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856ca1c0 INFO: task kworker/0:778:5322 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c81c1000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r5:85d2778c r4:85d27400 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 INFO: task kworker/0:779:5324 blocked for more than 468 seconds. [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ca400 r5:85675b8c r4:85675800 r7:dddced80 r6:83018000 r5:85675b8c r4:85684d80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:780:5326 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:780 state:D stack:0 pid:5326 tgid:5326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9a5d84 r8:00000002 r7:60000013 r6:eb9a5d8c r5:855c5400 r4:855c5400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855c5400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ca580 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5eb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85675f8c r4:85675c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85675f8c r4:85684e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855c5400 r8:85684eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85684e80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85684e80 r8:80287e08 r7:eb999e60 r6:85684f00 r5:855c5400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a5fb0 to 0xeb9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856ca200 INFO: task kworker/0:780:5326 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:00000000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:781 state:D stack:0 pid:5327 tgid:5327 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9add84 r8:00000002 r7:60000013 r6:eb9add8c r5:855c6000 r4:855c6000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855c6000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9ade08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ca700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5fd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567638c r4:85676000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567638c r4:85684f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855c6000 r8:85684fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85684f80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85684f80 r8:80287e08 r7:eb9a5e60 r6:856cb000 r5:855c6000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9adfb0 to 0xeb9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856ca380 INFO: task kworker/0:781:5327 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c85be000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:855c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 r5:8567678c r4:85676400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:856cb080 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:783:5331 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:783 state:D stack:0 pid:5331 tgid:5331 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9b5d84 r8:00000002 r7:60000013 r6:eb9b5d8c r5:855c3000 r4:855c3000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855c3000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cac40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb661000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85676b8c r4:85676800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85676b8c r4:856cb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855c3000 r8:856cb1ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: c89d1000 ed6eb000 00000001 80239b98 7f047000 00000001 r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eb9bdd84 r8:00000002 r7:60000113 r6:eb9bdd8c r5:855c6c00 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:8567738c r4:85677000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:855c6c00 r8:856cb2ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r4:dffe1dc0 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:320:5335 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:320 state:D stack:0 pid:5335 tgid:5335 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9c1d84 r8:00000002 r7:60000113 r6:eb9c1d8c r5:855c2400 r4:855c2400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855c2400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85685540 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:855c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb675000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e6b8c r4:855e6800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e6b8c r4:856cf180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855c2400 r8:856cf1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856cf180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:785 state:D stack:0 pid:5336 tgid:5336 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:eb69b000 r5:85676f8c r4:85676c00 r7:dddced80 r6:83018000 r5:85676f8c r4:856cb400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:dffe1dc0 r4:00000000 r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:321:5338 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:321 state:D stack:0 pid:5338 tgid:5338 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9a1d84 r8:00000002 r7:60000013 r6:eb9a1d8c r5:855c0000 r4:855c0000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855c0000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d7040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:855c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6cd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e6f8c r4:855e6c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e6f8c r4:856cf200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855c0000 r8:856cf22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856cf200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cf200 r8:80287e08 r7:eb981e60 r6:856cb500 r5:855c0000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a1fb0 to 0xeb9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/0:786:5340 blocked for more than 468 seconds. r10:8291a684 r9:eb9c9d84 r8:00000002 r7:60000113 r6:eb9c9d8c r5:855b4800 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:8567778c r4:85677400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:856caf40 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:322:5343 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:322 state:D stack:0 pid:5343 tgid:5343 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9d1d84 r8:00000002 r7:60000113 r6:eb9d1d8c r5:84ac9800 r4:84ac9800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ac9800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ea280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ac9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebab5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8442d38c r4:8442d000 r7:ddde2d80 r6:83018200 r5:8442d38c r4:856cf280 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r5:80070013 r4:80239bb0 r4:dffe1dc0 r5:00001000 r4:eb64f000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:855e778c r4:855e7400 r10:61c88647 r9:84710000 r8:856cf3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: c95c2000 ed6eb000 00000001 80239b98 7f047000 00000001 r4:dffe1dc0 r5:00001000 r4:eb64f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:787:5347 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:787 state:D stack:0 pid:5347 tgid:5347 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9d9d84 r8:00000002 r7:60000013 r6:eb9d9d8c r5:84713000 r4:84713000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84713000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d4300 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84713000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb723000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85677b8c r4:85677800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85677b8c r4:856cb680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84713000 r8:856cb6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856cb680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cb680 r8:80287e08 r7:eb9c9e60 r6:856cf480 r5:84713000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9d9fb0 to 0xeb9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856d4080 INFO: task kworker/0:787:5347 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c9857000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:788:5349 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:788 state:D stack:0 pid:5349 tgid:5349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9e1d84 r8:00000002 r7:60000113 r6:eb9e1d8c r5:84712400 r4:84712400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84712400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d4440 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84712400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb733000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85677f8c r4:85677c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85677f8c r4:856cb700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84712400 r8:856cb72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856cb700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cb700 r8:80287e08 r7:eb9d9e60 r6:856cf500 r5:84712400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e1fb0 to 0xeb9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856d4180 INFO: task kworker/0:788:5349 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c9c1c000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:789:5351 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:789 state:D stack:0 pid:5351 tgid:5351 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9f1d84 r8:00000002 r7:60000013 r6:eb9f1d8c r5:84713c00 r4:84713c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84713c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d4800 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84713c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567cb8c r4:8567c800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567cb8c r4:856cb780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84713c00 r8:856cb7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856cb780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cb780 r8:80287e08 r7:eb9e1e60 r6:856cf580 r5:84713c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f1fb0 to 0xeb9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856d42c0 INFO: task kworker/0:789:5351 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c9f2b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:790:5352 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:790 state:D stack:0 pid:5352 tgid:5352 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9f5d84 r8:00000002 r7:60000113 r6:eb9f5d8c r5:84715400 r4:84715400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84715400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d45c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84715400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb74b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567c38c r4:8567c000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567c38c r4:856cb800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84715400 r8:856cb82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856cb800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cb800 r8:80287e08 r7:eb9f1e60 r6:856cf600 r5:84715400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f5fb0 to 0xeb9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856d42c0 INFO: task kworker/0:790:5352 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c9f2b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:791:5354 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:791 state:D stack:0 pid:5354 tgid:5354 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9fdd84 r8:00000002 r7:60000113 r6:eb9fdd8c r5:84714800 r4:84714800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84714800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9fde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d46c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84714800 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb763000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567c78c r4:8567c400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567c78c r4:856cb880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84714800 r8:856cb8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856cb880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cb880 r8:80287e08 r7:eb9f1e60 r6:856cf680 r5:84714800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9fdfb0 to 0xeb9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856d43c0 INFO: task kworker/0:791:5354 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c9fe4000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:792:5357 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:792 state:D stack:0 pid:5357 tgid:5357 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba09d84 r8:00000002 r7:60000013 r6:eba09d8c r5:84710c00 r4:84710c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84710c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba09e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d4980 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84710c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7fb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567cf8c r4:8567cc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567cf8c r4:856cb900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84710c00 r8:856cb92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856cb900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cb900 r8:80287e08 r7:eb9f1e60 r6:856cf700 r5:84710c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba09fb0 to 0xeba09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856d4740 INFO: task kworker/0:792:5357 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ca3da000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:793:5360 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:793 state:D stack:0 pid:5360 tgid:5360 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba15d84 r8:00000002 r7:60000013 r6:eba15d8c r5:84711800 r4:84711800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84711800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba15e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d4a40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84711800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb81b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567d38c r4:8567d000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567d38c r4:856cb980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84711800 r8:856cb9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856cb980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cb980 r8:80287e08 r7:eba09e60 r6:856cf780 r5:84711800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba15fb0 to 0xeba15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856d4780 INFO: task kworker/0:793:5360 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ca633000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:794:5361 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:794 state:D stack:0 pid:5361 tgid:5361 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba21d84 r8:00000002 r7:60000113 r6:eba21d8c r5:856ad400 r4:856ad400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856ad400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba21e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d4bc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb82b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567d78c r4:8567d400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567d78c r4:856cba00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ad400 r8:856cba2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856cba00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cba00 r8:80287e08 r7:eba15e60 r6:856cf800 r5:856ad400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba21fb0 to 0xeba21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856d4780 INFO: task kworker/0:794:5361 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ca633000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:795:5363 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:795 state:D stack:0 pid:5363 tgid:5363 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba25d84 r8:00000002 r7:60000113 r6:eba25d8c r5:84716000 r4:84716000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84716000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba25e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d4d00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84716000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb839000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567db8c r4:8567d800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567db8c r4:856cba80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84716000 r8:856cbaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856cba80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cba80 r8:80287e08 r7:eba21e60 r6:856cf880 r5:84716000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba25fb0 to 0xeba25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856d49c0 INFO: task kworker/0:795:5363 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ca7e5000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:796:5364 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:796 state:D stack:0 pid:5364 tgid:5364 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba29d84 r8:00000002 r7:60000013 r6:eba29d8c r5:84716c00 r4:84716c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84716c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba29e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d4e80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84716c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb84b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567df8c r4:8567dc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567df8c r4:856cbb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84716c00 r8:856cbb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856cbb00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cbb00 r8:80287e08 r7:eba25e60 r6:856cf900 r5:84716c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba29fb0 to 0xeba29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856d49c0 INFO: task kworker/0:796:5364 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ca7e5000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:797:5367 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:797 state:D stack:0 pid:5367 tgid:5367 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba31d84 r8:00000002 r7:60000113 r6:eba31d8c r5:856b0c00 r4:856b0c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856b0c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba31e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e3040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8c9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567e78c r4:8567e400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567e78c r4:856cbb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0c00 r8:856cbbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856cbb80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cbb80 r8:80287e08 r7:eba29e60 r6:856cf980 r5:856b0c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba31fb0 to 0xeba31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856d4c80 INFO: task kworker/0:797:5367 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cab7a000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:798:5368 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:798 state:D stack:0 pid:5368 tgid:5368 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba35d84 r8:00000002 r7:60000113 r6:eba35d8c r5:856b1800 r4:856b1800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856b1800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba35e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d1fc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb885000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567e38c r4:8567e000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567e38c r4:856cbc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b1800 r8:856cbc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856cbc00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cbc00 r8:80287e08 r7:eba31e60 r6:856cfa00 r5:856b1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba35fb0 to 0xeba35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:856d4c80 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc5-syzkaller #0 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567eb8c r4:8567e800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567eb8c r4:856cbc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84acb000 r8:856cbcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856cbc80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cbc80 r8:80287e08 r7:eba31e60 r6:856cbd00 r5:84acb000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba1dfb0 to 0xeba1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856e3240 INFO: task kworker/0:799:5372 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cadfc000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc5-syzkaller #0 r5:84acbc00 r4:8291a680 r4:00000000 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e7b8c r4:855e7800 r7:ddde2d80 r6:83018200 r5:855e7b8c r4:856cfa80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:856d7580 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cb017000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:800:5375 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:800 state:D stack:0 pid:5375 tgid:5375 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba41d84 r8:00000002 r7:60000013 r6:eba41d8c r5:84acd400 r4:84acd400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84acd400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba41e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e3640 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84acd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba39000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567ef8c r4:8567ec00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567ef8c r4:856cbe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84acd400 r8:856cbe2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856cbe00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cbe00 r8:80287e08 r7:eba1de60 r6:856cbe80 r5:84acd400 r4:00000001 Exception stack(0xeba41fb0 to 0xeba41ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffe1d28 to 0xdffe1d70) 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:dffe1dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r5:00001000 r4:eb64f000 r5:85d2778c r4:85d27400 r4:848d9e00 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:801:5377 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:801 state:D stack:0 pid:5377 tgid:5377 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba4dd84 r8:00000002 r7:60000113 r6:eba4dd8c r5:84acc800 r4:84acc800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84acc800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba4de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e3a40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84acc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba55000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567f78c r4:8567f400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567f78c r4:856cbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84acc800 r8:856cbf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856cbf00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cbf00 r8:80287e08 r7:eba41e60 r6:856cbf80 r5:84acc800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba4dfb0 to 0xeba4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856e3340 INFO: task kworker/0:801:5377 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cb552000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:802:5379 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:802 state:D stack:0 pid:5379 tgid:5379 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba59d84 r8:00000002 r7:60000013 r6:eba59d8c r5:84acec00 r4:84acec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84acec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba59e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e3840 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84acec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567f38c r4:8567f000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567f38c r4:856e9000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84acec00 r8:856e902c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856e9000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e9000 r8:80287e08 r7:eba4de60 r6:856e9080 r5:84acec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba59fb0 to 0xeba59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856e36c0 INFO: task kworker/0:802:5379 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cb552000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:803:5381 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:803 state:D stack:0 pid:5381 tgid:5381 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba6dd84 r8:00000002 r7:60000113 r6:eba6dd8c r5:84ace000 r4:84ace000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ace000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba6de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e3980 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ace000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba91000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856fc38c r4:856fc000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856fc38c r4:856e9100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ace000 r8:856e912c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856e9100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e9100 r8:80287e08 r7:eba4de60 r6:856e9180 r5:84ace000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba6dfb0 to 0xeba6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856e3180 INFO: task kworker/0:803:5381 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cb781000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:00001000 r4:eb64f000 r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eba81d84 r8:00000002 r7:60000013 r6:eba81d8c r5:84ac8c00 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeba81fb0 to 0xeba81ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:325:5385 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:325 state:D stack:0 pid:5385 tgid:5385 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba85d84 r8:00000002 r7:60000113 r6:eba85d8c r5:856ae000 r4:856ae000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856ae000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba85e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d7980 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:856ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba69000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567fb8c r4:8567f800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8567fb8c r4:856cfb00 r10:61c88647 r9:856ae000 r8:856cfb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: cb983000 ed6eb000 00000001 80239b98 7f047000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:848cab40 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: cbaac000 ed6eb000 00000001 80239b98 7f047000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:805:5389 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:805 state:D stack:0 pid:5389 tgid:5389 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba7dd84 r8:00000002 r7:60000013 r6:eba7dd8c r5:84aca400 r4:84aca400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aca400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba7de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84aca400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba99000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856fc78c r4:856fc400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856fc78c r4:856e9400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aca400 r8:856e942c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856e9400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e9400 r8:80287e08 r7:eba6de60 r6:856e9480 r5:84aca400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba7dfb0 to 0xeba7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856e3f80 INFO: task kworker/0:805:5389 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:806:5391 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:806 state:D stack:0 pid:5391 tgid:5391 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba2dd84 r8:00000002 r7:60000013 r6:eba2dd8c r5:85708000 r4:85708000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85708000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba2de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85708000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaa1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856fcb8c r4:856fc800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:856e9500 Exception stack(0xeba2dfb0 to 0xeba2dff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) r4:848cab40 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:856d3100 Call trace: 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/1:327:5396 blocked for more than 469 seconds. r4:8570b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac9e08 r5:00001000 r4:ead8f000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cc42a000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:328:5397 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:328 state:D stack:0 pid:5397 tgid:5397 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba3dd84 r8:00000002 r7:60000113 r6:eba3dd8c r5:856b2400 r4:856b2400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856b2400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba3de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ea480 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:856b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0525000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8442d78c r4:8442d400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:856b2400 r8:856cfcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eb64f000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xebab9fb0 to 0xebab9ff8) r4:856d3640 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ccaa5000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:809:5401 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:809 state:D stack:0 pid:5401 tgid:5401 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebacdd84 r8:00000002 r7:60000013 r6:ebacdd8c r5:8570bc00 r4:8570bc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8570bc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebacde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3980 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8570bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfae7000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856fd38c r4:856fd000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: ccaa5000 ed6eb000 00000001 80239b98 7f047000 00000001 r4:dffe1dc0 r5:00001000 r4:eb64f000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:810:5404 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:810 state:D stack:0 pid:5404 tgid:5404 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebad5d84 r8:00000002 r7:60000013 r6:ebad5d8c r5:8570a400 r4:8570a400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8570a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3bc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8570a400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea901000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856fd78c r4:856fd400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856fd78c r4:856e9900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8570a400 r8:856e992c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856e9900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e9900 r8:80287e08 r7:ebab9e60 r6:856e9980 r5:8570a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebad5fb0 to 0xebad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856d3640 INFO: task kworker/0:810:5404 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:811:5407 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:811 state:D stack:0 pid:5407 tgid:5407 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaddd84 r8:00000002 r7:60000113 r6:ebaddd8c r5:85708c00 r5:85708c00 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856fdb8c r4:856fd800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: cce09000 ed6eb000 00000001 80239b98 7f047000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r5:85d2778c r4:85d27400 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8570e000 r8:856cfe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856ea380 INFO: task kworker/1:329:5409 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cce09000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:330:5410 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:330 state:D stack:0 pid:5410 tgid:5410 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebae9d84 r8:00000002 r7:60000113 r6:ebae9d8c r5:8570d400 r4:8570d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8570d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ea780 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8570d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0f9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577038c r4:85770000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577038c r4:856cfe80 r4:856cfe80 Exception stack(0xebae9fb0 to 0xebae9ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eb64f000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xdffe1fb0 to 0xdffe1ff8) r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:812:5412 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:812 state:D stack:0 pid:5412 tgid:5412 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaedd84 r8:00000002 r7:60000013 r6:ebaedd8c r5:8570c800 r4:8570c800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8570c800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaede08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cd0c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8570c800 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf6d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856fe38c r4:856fe000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856fe38c r4:856e9c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8570c800 r8:856e9c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856e9c00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e9c00 r8:80287e08 r7:ebab9e60 r6:856e9c80 r5:8570c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaedfb0 to 0xebaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856cd100 INFO: task kworker/0:812:5412 is blocked on a mutex likely owned by task kworker/0:115:3602. r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r5:85d2778c r4:85d27400 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:813:5413 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:813 state:D stack:0 pid:5413 tgid:5413 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebae1d84 r8:00000002 r7:60000113 r6:ebae1d8c r5:85710000 r4:85710000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85710000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cd400 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85710000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 r5:00001000 r4:eafe3000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) r4:848cab40 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:856e9e00 Exception stack(0xebac5fb0 to 0xebac5ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cd8b5000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:815:5417 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:815 state:D stack:0 pid:5417 tgid:5417 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaf1d84 r8:00000002 r7:60000013 r6:ebaf1d8c r5:856b5400 r4:856b5400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856b5400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cd980 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb34b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ff38c r4:856ff000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/1:331:5419 blocked for more than 469 seconds. r5:856b6c00 r4:8291a680 r4:00000000 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856ea740 INFO: task kworker/1:331:5419 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cde52000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:848cab40 task:kworker/1:332 state:D stack:0 pid:5422 tgid:5422 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad1e08 r5:00001000 r4:e076d000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577138c r4:85771000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577138c r4:856d8100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b6000 r8:856d812c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d8100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d8100 r8:80287e08 r7:ebae5e60 r6:856d8180 r5:856b6000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebad1fb0 to 0xebad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856ea8c0 INFO: task kworker/1:332:5422 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cdecf000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 INFO: task kworker/0:816:5425 blocked for more than 469 seconds. r5:855c3c00 r4:8291a680 r4:00000000 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ff78c r4:856ff400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdffe1fb0 to 0xdffe1ff8) r4:848cab40 INFO: task kworker/0:817:5427 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:817 state:D stack:0 pid:5427 tgid:5427 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb0dd84 r8:00000002 r7:60000113 r6:ebb0dd8c r5:84800c00 r4:84800c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84800c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb0de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cdbc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84800c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb39d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ffb8c r4:856ff800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856ffb8c r4:856e9f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84800c00 r8:856e9fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856e9f80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e9f80 r8:80287e08 r7:ebb05e60 r6:856d8280 r5:84800c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb0dfb0 to 0xebb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856cd880 INFO: task kworker/0:817:5427 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:848cab40 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856fff8c r4:856ffc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856fff8c r4:856c8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85711800 r8:856c802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856c8000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c8000 r8:80287e08 r7:ebb0de60 r6:856c8080 r5:85711800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaf9fb0 to 0xebaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856cda00 INFO: task kworker/0:818:5428 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ce757000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb11e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cdf00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85712400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb469000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574038c r4:85740000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8574038c r4:856c8100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85712400 r8:856c812c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856c8100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c8100 r8:80287e08 r7:ebaf9e60 r6:856c8180 r5:85712400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb11fb0 to 0xebb11ff8) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eb64f000 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:820:5433 blocked for more than 469 seconds. r5:85713000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856dd040 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:856c8200 r8:80287e08 r7:ebb11e60 r6:856c8280 r5:85713000 r4:856cdd80 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:821:5434 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:821 state:D stack:0 pid:5434 tgid:5434 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb15d84 r8:00000002 r7:60000113 r6:ebb15d8c r5:85713c00 r4:85713c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85713c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb15e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cd6c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85713c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4a3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574078c r4:85740400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8574078c r4:856c8300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85713c00 r8:856c832c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856c8300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c8300 r8:80287e08 r7:ebb09e60 r6:856c8380 r5:85713c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb15fb0 to 0xebb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856cde00 INFO: task kworker/0:821:5434 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cecf8000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:822:5438 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:822 state:D stack:0 pid:5438 tgid:5438 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb19d84 r8:00000002 r7:60000113 r6:ebb19d8c r5:85714800 r4:85714800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85714800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb19e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856dd280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85714800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb571000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85740f8c r4:85740c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85740f8c r4:856c8400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85714800 r8:856c842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856c8400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c8400 r8:80287e08 r7:ebb09e60 r6:856c8480 r5:85714800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb19fb0 to 0xebb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856dd100 INFO: task kworker/0:822:5438 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cecf8000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r5:85d2778c r4:85d27400 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85715400 r8:856c852c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cf078000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:824 state:D stack:0 pid:5440 tgid:5440 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574178c r4:85741400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8574178c r4:856c8600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85716000 r8:856c862c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856c8600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c8600 r8:80287e08 r7:ebafde60 r6:856c8680 r5:85716000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb21fb0 to 0xebb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856dd100 INFO: task kworker/0:824:5440 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cf209000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb25e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856dd940 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85716c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb94f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85741f8c r4:85741c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85741f8c r4:856c8700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85716c00 r8:856c872c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856c8700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c8700 r8:80287e08 r7:ebb21e60 r6:856c8780 r5:85716c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb25fb0 to 0xebb25ff8) 5fa0: 00000000 00000000 00000000 00000000 r4:856dd4c0 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eb64f000 r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:826:5444 blocked for more than 469 seconds. r4:85710c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb29e08 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:856c8800 Exception stack(0xebb29fb0 to 0xebb29ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:827:5446 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:827 state:D stack:0 pid:5446 tgid:5446 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb2dd84 r8:00000002 r7:60000113 r6:ebb2dd8c r5:8570ec00 r4:8570ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8570ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb2de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856dda40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8570ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb963000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574238c r4:85742000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8574238c r4:856c8900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8570ec00 r8:856c892c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856c8900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c8900 r8:80287e08 r7:ebb25e60 r6:856c8980 r5:8570ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb2dfb0 to 0xebb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856dd7c0 INFO: task kworker/0:827:5446 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cf97d000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:00000000 r5:85d2778c r4:85d27400 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ebac1000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:856c8a00 Exception stack(0xebb39fb0 to 0xebb39ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:829:5450 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:829 state:D stack:0 pid:5450 tgid:5450 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb51d84 r8:00000002 r7:60000113 r6:ebb51d8c r5:84800000 r4:84800000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84800000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb51e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ddd00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84800000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb41000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85742b8c r4:85742800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85742b8c r4:856c8a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84800000 r8:856c8aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856c8a80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c8a80 r8:80287e08 r7:ebb39e60 r6:856d8380 r5:84800000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb51fb0 to 0xebb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856dd9c0 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:85d2778c r4:85d27400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:8291a684 r9:ebb35d84 r8:00000002 r7:60000013 r6:ebb35d8c r5:85718000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb35fb0 to 0xebb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856ddb80 INFO: task kworker/0:830:5452 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d00c3000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856dde40 r5:85742f8c r4:85742c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:856c8c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 task:kworker/0:832 state:D stack:0 pid:5456 tgid:5456 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb55e08 r5:85743f8c r4:85743c00 r7:dddced80 r6:83018000 r5:85743f8c r4:856c8d00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d0763000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:833:5457 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:833 state:D stack:0 pid:5457 tgid:5457 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb6dd84 r8:00000002 r7:60000113 r6:ebb6dd8c r5:8571a400 r4:8571a400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8571a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb6de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856eaec0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8571a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb69000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574378c r4:85743400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8574378c r4:856c8e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8571a400 r8:856c8e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856c8e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c8e00 r8:80287e08 r7:ebb55e60 r6:856c8e80 r5:8571a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb6dfb0 to 0xebb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856eaf80 INFO: task kworker/0:833:5457 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d088c000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:834:5460 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:834 state:D stack:0 pid:5460 tgid:5460 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8571b000 r4:00000000 r5:85743b8c r4:85743800 r10:61c88647 r9:8571b000 r8:856c8f2c r7:82804d40 r6:dddced80 r5:dddceda0 Call trace: 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:85d2778c r4:85d27400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb85e08 r5:8574c78c r4:8574c400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d0ce7000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r5:85d2778c r4:85d27400 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb91e08 r9:83018005 r8:8571c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 r5:8574c38c r4:8574c000 r10:61c88647 r9:8571c800 r8:857b712c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:837:5466 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:837 state:D stack:0 pid:5466 tgid:5466 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8574cb8c r4:8574c800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:857b7200 r8:80287e08 r7:ebb85e60 r6:857b7280 r5:8571d400 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:838:5468 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:838 state:D stack:0 pid:5468 tgid:5468 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebba9d84 r8:00000002 r7:60000013 r6:ebba9d8c r5:8571e000 r4:8571e000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8571e000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857af900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8571e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbb1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574cf8c r4:8574cc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8574cf8c r4:857b7300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8571e000 r8:857b732c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b7300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b7300 r8:80287e08 r7:ebb9de60 r6:857b7380 r5:8571e000 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/0:839:5470 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:839 state:D stack:0 pid:5470 tgid:5470 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb61d84 r8:00000002 r7:60000113 r6:ebb61d8c r5:84798000 r4:84798000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84798000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb61e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857afb00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84798000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbbd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574d38c r4:8574d000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8574d38c r4:857b7400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84798000 r8:857b742c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b7400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b7400 r8:80287e08 r7:ebba9e60 r6:857b7480 r5:84798000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb61fb0 to 0xebb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xdffe1d28 to 0xdffe1d70) r4:00000000 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8574d78c r4:8574d400 r4:00000001 r4:857af840 Exception stack(0xdffe1d28 to 0xdffe1d70) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:841:5474 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:841 state:D stack:0 pid:5474 tgid:5474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbd5d84 r8:00000002 r7:60000013 r6:ebbd5d8c r5:84798c00 r4:84798c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84798c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbd5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857aff80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84798c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574db8c r4:8574d800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8574db8c r4:857b7600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84798c00 r8:857b762c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b7600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b7600 r8:80287e08 r7:ebbb5e60 r6:857b7680 r5:84798c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbd5fb0 to 0xebbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857afa00 INFO: task kworker/0:841:5474 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d17c0000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85d2778c r4:85d27400 r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:842:5476 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:842 state:D stack:0 pid:5476 tgid:5476 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbe1d84 r8:00000002 r7:60000013 r6:ebbe1d8c r5:8479bc00 r4:8479bc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8479bc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:8574df8c r4:8574dc00 r10:61c88647 r9:8479bc00 r8:857b772c r7:82804d40 r6:dddced80 r5:dddceda0 1d60: 80230ad0 80239bb0 80070013 ffffffff [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:8291a684 r9:ebbedd84 r8:00000002 r7:60000113 r6:ebbedd8c r5:8479b000 r4:8479b000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8479b000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbede08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ba440 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8479b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0e1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc25000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574e78c r4:8574e400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8574e78c r4:857b7800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8479b000 r8:857b782c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:857b7800 r8:80287e08 r7:ebbe1e60 r6:857b7880 r5:8479b000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:00000000 r9:856d8400 r8:80287e08 r7:ebad1e60 r6:857b7900 r5:8479c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 task:kworker/0:844 state:D stack:0 pid:5482 tgid:5482 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc29d84 r8:00000002 r7:60000113 r6:ebc29d8c r5:8479d400 r4:8479d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8479d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc29e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ba300 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8479d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbf5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574e38c r4:8574e000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:857b7980 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85d2778c r4:85d27400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc3de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ba600 r4:00000000 r5:8574eb8c r4:8574e800 r7:dddced80 r6:83018000 r5:8574eb8c r4:857b7a80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xdffe1d28 to 0xdffe1d70) r5:00001000 r4:eb64f000 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 Call trace: [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8577178c r4:85771400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:857b7b00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b7b00 r8:80287e08 r7:ebc3de60 r6:856d8500 r5:84805400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc51fb0 to 0xebc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857ba480 INFO: task kworker/0:846:5486 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:00001000 r4:eb64f000 r4:00000001 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9dde08 r5:8577238c r4:85772000 r7:ddde2d80 r6:83018200 r5:8577238c r4:856d8580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84806000 r8:856d85ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d8580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d8580 r8:80287e08 r7:ebad1e60 r6:856d8600 r5:84806000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9ddfb0 to 0xeb9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857aeec0 INFO: task kworker/1:334:5490 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d2285000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:335:5493 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:335 state:D stack:0 pid:5493 tgid:5493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba0dd84 r8:00000002 r7:60000013 r6:eba0dd8c r5:84806c00 r4:84806c00 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84806c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 r5:8574f78c r4:8574f400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574f78c r4:856d8680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84806c00 r8:856d86ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d8680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d8680 r8:80287e08 r7:eb9dde60 r6:856d8700 r5:84806c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba0dfb0 to 0xeba0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857ae7c0 INFO: task kworker/1:335:5493 is blocked on a mutex likely owned by task kworker/0:115:3602. r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:847:5495 blocked for more than 470 seconds. Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eabad000 r5:8574f38c r4:8574f000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8574f38c r4:857b7b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84803c00 r8:857b7bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b7b80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b7b80 r8:80287e08 r7:ebc51e60 r6:856d8780 r5:84803c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba71fb0 to 0xeba71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857ba940 INFO: task kworker/0:847:5495 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d2727000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:85d2778c r4:85d27400 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:848:5496 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:848 state:D stack:0 pid:5496 tgid:5496 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc55d84 r8:00000002 r7:60000113 r6:ebc55d8c r5:84803000 r4:84803000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84803000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc55e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bac00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84803000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2b7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574fb8c r4:8574f800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8574fb8c r4:857b7c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84803000 r8:857b7c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b7c00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b7c00 r8:80287e08 r7:eba71e60 r6:856d8880 r5:84803000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc55fb0 to 0xebc55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857ba940 INFO: task kworker/0:848:5496 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:849:5497 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:849 state:D stack:0 pid:5497 tgid:5497 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc59d84 r8:00000002 r7:60000113 r6:ebc59d8c r5:856b0000 r4:856b0000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856b0000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc59e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c1740 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7f1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575c78c r4:8575c400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575c78c r4:857b7c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:857b7cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b7c80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b7c80 r8:80287e08 r7:ebc55e60 r6:856d8800 r5:856b0000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc59fb0 to 0xebc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857ba940 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:336:5499 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:336 state:D stack:0 pid:5499 tgid:5499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc5dd84 r8:00000002 r7:60000113 r6:ebc5dd8c r5:856b8000 r4:856b8000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856b8000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc5de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r9:83018205 r8:856b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb147000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85771b8c r4:85771800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85771b8c r4:856d8900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r4:856b8c00 r5:856b8c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba05e08 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85771f8c r4:85771c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85771f8c r4:856d8a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b8c00 r8:856d8a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d8a00 r10:00000000 r9:856d8a00 r8:80287e08 r7:eb9dde60 r6:856d8a80 r5:856b8c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdffe1d28 to 0xdffe1d70) 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:850:5503 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:850 state:D stack:0 pid:5503 tgid:5503 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc6dd84 r8:00000002 r7:60000113 r6:ebc6dd8c r5:856bb000 r4:856bb000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856bb000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc6de08 r4:00000000 r5:00001000 r4:eb5bf000 r5:8577278c r4:85772400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8577278c r4:857b7d00 r10:61c88647 r9:856bb000 r8:857b7d2c r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:00000000 r5:85d2778c r4:85d27400 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:338:5505 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:338 state:D stack:0 pid:5505 tgid:5505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc4dd84 r8:00000002 r7:60000013 r6:ebc4dd8c r5:8479ec00 r4:8479ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8479ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc4de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857cc8c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8479ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb603000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85772f8c r4:85772c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85772f8c r4:856d8b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8479ec00 r8:856d8bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d8b80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d8b80 r8:80287e08 r7:eb9dde60 r6:857b7d80 r5:8479ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc4dfb0 to 0xebc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857cc640 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:339:5506 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:339 state:D stack:0 pid:5506 tgid:5506 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85772b8c r4:85772800 r10:61c88647 r9:8479a400 r8:856d8c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857cc9c0 INFO: task kworker/1:339:5506 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d36a3000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:848cab40 Workqueue: events bpf_prog_free_deferred r5:8479e000 r4:8291a680 r4:00000000 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577338c r4:85773000 r7:ddde2d80 r6:83018200 r5:8577338c r4:856d8c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8479e000 r8:856d8cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d8c80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d8c80 r8:80287e08 r7:ebc4de60 r6:857b7e80 r5:8479e000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc7dfb0 to 0xebc7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857ccb00 INFO: task kworker/1:340:5510 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d3a72000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:341:5511 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:341 state:D stack:0 pid:5511 tgid:5511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:848f8000 r4:00000000 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577378c r4:85773400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577378c r4:856d8d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848f8000 r8:856d8d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d8d00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d8d00 r8:80287e08 r7:ebc7de60 r6:857b7f00 r5:848f8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc81fb0 to 0xebc81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857ccd40 INFO: task kworker/1:341:5511 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000001 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r9:83018205 r8:848f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 r5:85773f8c r4:85773c00 r4:856d8d80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857cccc0 INFO: task kworker/1:342:5513 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d40ae000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r7:dddced80 r6:83018000 r5:8574ff8c r4:857c3000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:00000000 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:343:5516 blocked for more than 470 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebca1e08 r5:85773b8c r4:85773800 r10:61c88647 r9:848f8c00 r8:856d8e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:344:5519 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:344 state:D stack:0 pid:5519 tgid:5519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebca5d84 r8:00000002 r7:60000013 r6:ebca5d8c r5:848fbc00 r4:848fbc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848fbc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebca5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6340 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:848fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 r5:8577c38c r4:8577c000 r7:ddde2d80 r6:83018200 r5:8577c38c r4:856d8e80 Exception stack(0xebca5fb0 to 0xebca5ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r5:85d2778c r4:85d27400 r4:848d9e00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:345:5520 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:345 state:D stack:0 pid:5520 tgid:5520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcadd84 r8:00000002 r7:60000013 r6:ebcadd8c r5:848fc800 r4:848fc800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848fc800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8442db8c r4:8442d800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:856d8f00 r8:80287e08 r7:ebca5e60 r6:857c3200 r5:848fc800 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:346:5523 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:346 state:D stack:0 pid:5523 tgid:5523 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcb1d84 r8:00000002 r7:60000013 r6:ebcb1d8c r5:848fd400 r4:848fd400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848fd400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcb1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6500 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:848fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb731000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577c78c r4:8577c400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577c78c r4:856d8f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848fd400 r8:856d8fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d8f80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d8f80 r8:80287e08 r7:ebca5e60 r6:857c3280 r5:848fd400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcb1fb0 to 0xebcb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857c6240 INFO: task kworker/1:346:5523 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d48c6000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:347:5525 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:347 state:D stack:0 pid:5525 tgid:5525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc69d84 r8:00000002 r7:60000013 r6:ebc69d8c r5:848fe000 r4:848fe000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848fe000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc69e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6600 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:848fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb753000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577cb8c r4:8577c800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577cb8c r4:857c8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848fe000 r8:857c802c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c8000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c8000 r8:80287e08 r7:ebcb1e60 r6:857c3300 r5:848fe000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc69fb0 to 0xebc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857c6100 INFO: task kworker/1:347:5525 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d4d42000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:852:5526 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:852 state:D stack:0 pid:5526 tgid:5526 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcb5d84 r8:00000002 r7:60000113 r6:ebcb5d8c r5:848fec00 r4:848fec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848fec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcb5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c1640 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:848fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb773000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575c38c r4:8575c000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575c38c r4:857c3380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848fec00 r8:857c33ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857c3380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c3380 r8:80287e08 r7:ebc59e60 r6:857c3400 r5:848fec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcb5fb0 to 0xebcb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857c1280 INFO: task kworker/0:852:5526 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d4d42000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:348:5528 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:348 state:D stack:0 pid:5528 tgid:5528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcb9d84 r8:00000002 r7:60000013 r6:ebcb9d8c r5:848fa400 r4:848fa400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848fa400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcb9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6a00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:848fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb82f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577d38c r4:8577d000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577d38c r4:857c8080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848fa400 r8:857c80ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c8080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c8080 r8:80287e08 r7:ebc69e60 r6:857c3480 r5:848fa400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcb9fb0 to 0xebcb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857c6400 INFO: task kworker/1:348:5528 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d4d42000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:853:5531 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:853 state:D stack:0 pid:5531 tgid:5531 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc39d84 r8:00000002 r7:60000013 r6:ebc39d8c r5:8571ec00 r4:8571ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8571ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc39e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d1540 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8571ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfafb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575d78c r4:8575d400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575d78c r4:857c3500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8571ec00 r8:857c352c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857c3500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c3500 r8:80287e08 r7:ebc59e60 r6:857c3580 r5:8571ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc39fb0 to 0xebc39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857c1540 INFO: task kworker/0:853:5531 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d5220000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:349:5532 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:349 state:D stack:0 pid:5532 tgid:5532 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcbdd84 r8:00000002 r7:60000113 r6:ebcbdd8c r5:85730000 r4:85730000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85730000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcbde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85730000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb81f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577cf8c r4:8577cc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577cf8c r4:857c8100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85730000 r8:857c812c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c8100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c8100 r8:80287e08 r7:ebcb9e60 r6:857c3600 r5:85730000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcbdfb0 to 0xebcbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857c6640 INFO: task kworker/1:349:5532 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d5566000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:854:5534 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:854 state:D stack:0 pid:5534 tgid:5534 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcc5d84 r8:00000002 r7:60000113 r6:ebcc5d8c r5:85730c00 r4:85730c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85730c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcc5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c1e00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85730c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9f9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575cb8c r4:8575c800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85730c00 r8:857c36ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdffe1d28 to 0xdffe1d70) 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:350:5537 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:350 state:D stack:0 pid:5537 tgid:5537 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcc9d84 r8:00000002 r7:60000113 r6:ebcc9d8c r5:85731800 r4:85731800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85731800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcc9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6bc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85731800 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb849000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577d78c r4:8577d400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577d78c r4:857c8180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85731800 r8:857c81ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c8180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c8180 r8:80287e08 r7:ebcb9e60 r6:857c3780 r5:85731800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcc9fb0 to 0xebcc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857c6800 INFO: task kworker/1:350:5537 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d5a97000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:351:5539 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:351 state:D stack:0 pid:5539 tgid:5539 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebccdd84 r8:00000002 r7:60000013 r6:ebccdd8c r5:85732400 r4:85732400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85732400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebccde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:8577db8c r4:8577d800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d60: 80230ad0 80239bb0 80070013 ffffffff [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:352:5541 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:352 state:D stack:0 pid:5541 tgid:5541 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcd1d84 r8:00000002 r7:60000113 r6:ebcd1d8c r5:85733000 r4:85733000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85733000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6dc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85733000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8c1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577df8c r4:8577dc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577df8c r4:857c8280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85733000 r8:857c82ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c8280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c8280 r8:80287e08 r7:ebccde60 r6:857c3880 r5:85733000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcd1fb0 to 0xebcd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857c6b00 INFO: task kworker/1:352:5541 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d5edd000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:353:5543 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:353 state:D stack:0 pid:5543 tgid:5543 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcd5d84 r8:00000002 r7:60000013 r6:ebcd5d8c r5:85733c00 r4:85733c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85733c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6f40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85733c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8db000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577e38c r4:8577e000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577e38c r4:857c8300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85733c00 r8:857c832c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c8300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c8300 r8:80287e08 r7:ebcd1e60 r6:857c3900 r5:85733c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcd5fb0 to 0xebcd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857c6c40 INFO: task kworker/1:353:5543 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d5edd000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:354:5544 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:354 state:D stack:0 pid:5544 tgid:5544 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcd9d84 r8:00000002 r7:60000113 r6:ebcd9d8c r5:85734800 r4:85734800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85734800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d4300 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85734800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba73000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577f38c r4:8577f000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577f38c r4:857c8380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85734800 r8:857c83ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c8380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c8380 r8:80287e08 r7:ebcd5e60 r6:857c3980 r5:85734800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcd9fb0 to 0xebcd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857c6940 INFO: task kworker/1:354:5544 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d5edd000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:355:5546 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:355 state:D stack:0 pid:5546 tgid:5546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcc1d84 r8:00000002 r7:60000113 r6:ebcc1d8c r5:85735400 r4:85735400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85735400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcc1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6480 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85735400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577e78c r4:8577e400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577e78c r4:857c8400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85735400 r8:857c842c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c8400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c8400 r8:80287e08 r7:ebcd9e60 r6:857c3a00 r5:85735400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcc1fb0 to 0xebcc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857c6e40 INFO: task kworker/1:355:5546 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d5edd000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:855:5548 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:855 state:D stack:0 pid:5548 tgid:5548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcddd84 r8:00000002 r7:60000113 r6:ebcddd8c r5:85736000 r4:85736000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85736000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcdde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d1040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85736000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba43000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575cf8c r4:8575cc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575cf8c r4:857c3a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85736000 r8:857c3aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857c3a80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c3a80 r8:80287e08 r7:ebc39e60 r6:857c3b00 r5:85736000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcddfb0 to 0xebcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857c1c80 INFO: task kworker/0:855:5548 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d68cb000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:356:5550 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:356 state:D stack:0 pid:5550 tgid:5550 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebce5d84 r8:00000002 r7:60000113 r6:ebce5d8c r5:85736c00 r4:85736c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85736c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebce5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ae400 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85736c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba51000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577eb8c r4:8577e800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: d6ec1000 ed6eb000 00000001 80239b98 7f047000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r4:847f9800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcede08 r9:83018005 r8:847f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 r5:8575db8c r4:8575d800 r10:61c88647 r9:847f9800 r8:857c3c2c r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:856:5553 is blocked on a mutex likely owned by task kworker/0:115:3602. r4:00000000 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:357:5555 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:357 state:D stack:0 pid:5555 tgid:5555 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcf5d84 r8:00000002 r7:60000113 r6:ebcf5d8c r5:847fa400 r4:847fa400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847fa400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcf5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d4040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:847fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba5f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577ef8c r4:8577ec00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577ef8c r4:857c8500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847fa400 r8:857c852c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c8500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c8500 r8:80287e08 r7:ebcd9e60 r6:857c3d00 r5:847fa400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcf5fb0 to 0xebcf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857d4080 INFO: task kworker/1:357:5555 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d753b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:358:5557 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:358 state:D stack:0 pid:5557 tgid:5557 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec505d84 r8:00000002 r7:60000013 r6:ec505d8c r5:847f8000 r5:847f8000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec505e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d46c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:847f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaa3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577ff8c r4:8577fc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577ff8c r4:857c8580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847f8000 r8:857c85ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c8580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c8580 r8:80287e08 r7:ebcd9e60 r6:857c3d80 r5:847f8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec505fb0 to 0xec505ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857d4180 INFO: task kworker/1:358:5557 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d77e2000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred r4:847f8c00 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:847f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r5:8577f78c r4:8577f400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577f78c r4:857c8600 r4:857c8600 r10:00000000 r9:857c8600 r8:80287e08 r7:ec505e60 r6:857c3e00 r5:847f8c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec509fb0 to 0xec509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857d4180 INFO: task kworker/1:359:5559 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d79fe000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:360:5562 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:360 state:D stack:0 pid:5562 tgid:5562 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec525d84 r8:00000002 r7:60000113 r6:ec525d8c r5:847fd400 r4:847fd400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847fd400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec525e08 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:00001000 r4:eba97000 r5:8577fb8c r4:8577f800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577fb8c r4:857c8680 r10:61c88647 r9:847fd400 r8:857c86ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xec525fb0 to 0xec525ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Call trace: 1d20: d801f000 ed6eb000 00000001 80239b98 7f047000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r5:85d2778c r4:85d27400 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d4e40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:847fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac9f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8578178c r4:85781400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578178c r4:857c8700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847fe000 r8:857c872c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c8700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c8700 r8:80287e08 r7:ec505e60 r6:857c3f00 r5:847fe000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec529fb0 to 0xec529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857d4540 INFO: task kworker/1:361:5563 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d801f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:362:5565 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d4880 r5:8578038c r4:85780000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:363:5567 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:363 state:D stack:0 pid:5567 tgid:5567 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec539d84 r8:00000002 r7:60000113 r6:ec539d8c r5:847fc800 r4:847fc800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847fc800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec539e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d4940 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:8578078c r4:85780400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xec539fb0 to 0xec539ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857d4840 INFO: task kworker/1:363:5567 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d8699000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:364:5568 blocked for more than 471 seconds. r5:847fbc00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec53de08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85780b8c r4:85780800 r7:ddde2d80 r6:83018200 r5:85780b8c r4:857c8880 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:365:5570 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:365 state:D stack:0 pid:5570 tgid:5570 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec549d84 r8:00000002 r7:60000013 r6:ec549d8c r5:85838c00 r4:85838c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85838c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec549e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d4c00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85838c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec50b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85780f8c r4:85780c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85780f8c r4:857c8900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85838c00 r8:857c892c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c8900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c8900 r8:80287e08 r7:ec529e60 r6:857b6100 r5:85838c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec549fb0 to 0xec549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857d4980 INFO: task kworker/1:365:5570 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d8db7000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:366:5572 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:366 state:D stack:0 pid:5572 tgid:5572 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec559d84 r8:00000002 r7:60000113 r6:ec559d8c r5:85838000 r4:85838000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85838000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec559e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d4d00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85838000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec54f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8578138c r4:85781000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578138c r4:857c8980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85838000 r8:857c89ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c8980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c8980 r8:80287e08 r7:ec529e60 r6:857b6180 r5:85838000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec559fb0 to 0xec559ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857d4c40 INFO: task kworker/1:366:5572 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d94ce000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:857:5577 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:857 state:D stack:0 pid:5577 tgid:5577 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8575df8c r4:8575dc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575df8c r4:857b6200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:857b6200 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:857:5577 is blocked on a mutex likely owned by task kworker/0:115:3602. Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d9aa4000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:858:5579 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:858 state:D stack:0 pid:5579 tgid:5579 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec561d84 r8:00000002 r7:60000113 r6:ec561d8c r5:8583bc00 r4:8583bc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8583bc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec561e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f8a00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8583bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb19b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575eb8c r4:8575e800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575eb8c r4:857b6300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8583bc00 r8:857b632c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b6300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b6300 r8:80287e08 r7:ebb45e60 r6:857b6380 r5:8583bc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec561fb0 to 0xec561ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: da0e5000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:859:5581 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:859 state:D stack:0 pid:5581 tgid:5581 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec569d84 r8:00000002 r7:60000113 r6:ec569d8c r5:8583c800 r4:8583c800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8583c800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec569e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f8900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8583c800 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb061000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575e78c r4:8575e400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575e78c r4:857b6400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8583c800 r8:857b642c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b6400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b6400 r8:80287e08 r7:ec561e60 r6:857b6480 r5:8583c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec569fb0 to 0xec569ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Call trace: r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r5:80070013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:848cab40 Workqueue: events bpf_prog_free_deferred r4:8583a400 r5:8583a400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec56de08 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d4f80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8583a400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaef7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85781b8c r4:85781800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85781b8c r4:857c8a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8583a400 r8:857c8a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c8a00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c8a00 r8:80287e08 r7:ec529e60 r6:857b6500 r5:8583a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec56dfb0 to 0xec56dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857d4cc0 INFO: task kworker/1:367:5582 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: da710000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:368:5583 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:368 state:D stack:0 pid:5583 tgid:5583 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec575d84 r8:00000002 r7:60000113 r6:ec575d8c r5:85839800 r4:85839800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85839800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec575e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85861680 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85839800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab77000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85782b8c r4:85782800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85782b8c r4:857c8a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85839800 r8:857c8aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c8a80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c8a80 r8:80287e08 r7:ec56de60 r6:857b6580 r5:85839800 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r5:85d2778c r4:85d27400 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec579e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8575e38c r4:8575e000 r4:857c8b00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:370:5587 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:370 state:D stack:0 pid:5587 tgid:5587 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec57dd84 r8:00000002 r7:60000113 r6:ec57dd8c r5:8583ec00 r4:8583ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8583ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec57de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e4040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8583ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbb7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576fb8c r4:8576f800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8576fb8c r4:857c8b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8583ec00 r8:857c8bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c8b80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c8b80 r8:80287e08 r7:ec575e60 r6:857c8c00 r5:8583ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec57dfb0 to 0xec57dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:860:5590 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:860 state:D stack:0 pid:5590 tgid:5590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec581d84 r8:00000002 r7:60000013 r6:ec581d8c r5:856bec00 r4:856bec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856bec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec581e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f8cc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb349000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575f38c r4:8575f000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575f38c r4:857b6680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856bec00 r8:857b66ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xec581fb0 to 0xec581ff8) INFO: task kworker/0:860:5590 is blocked on a mutex likely owned by task kworker/0:115:3602. Exception stack(0xdffe1d28 to 0xdffe1d70) 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:861:5592 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:861 state:D stack:0 pid:5592 tgid:5592 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec589d84 r8:00000002 r7:60000113 r6:ec589d8c r5:856be000 r4:856be000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856be000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec589e08 r4:00000000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8575ef8c r4:8575ec00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575ef8c r4:857b6700 r10:61c88647 r9:856be000 r8:857b672c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:857b6700 r8:80287e08 r7:ec581e60 r6:857c8d00 r5:856be000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdffe1d28 to 0xdffe1d70) 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:82ac21e4 r4:dffe1dc0 r4:00000000 r5:00001000 r4:eb64f000 r5:85d2778c r4:85d27400 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xdffe1fb0 to 0xdffe1ff8) r4:848cab40 Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:862 state:D stack:0 pid:5593 tgid:5593 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec58dd84 r8:00000002 r7:60000013 r6:ec58dd8c r5:856bd400 r4:856bd400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856bd400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec58de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c1f40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4f1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576c38c r4:8576c000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576c38c r4:857b6780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856bd400 r8:857b67ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b6780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b6780 r8:80287e08 r7:ec581e60 r6:857c8d80 r5:856bd400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec58dfb0 to 0xec58dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856f89c0 INFO: task kworker/0:862:5593 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: db6e3000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:863:5595 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:863 state:D stack:0 pid:5595 tgid:5595 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec595d84 r8:00000002 r7:60000013 r6:ec595d8c r5:856bc800 r4:856bc800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856bc800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec595e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f8e00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb37b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575f78c r4:8575f400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575f78c r4:857b6800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856bc800 r8:857b682c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b6800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b6800 r8:80287e08 r7:ec58de60 r6:857c8e00 r5:856bc800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec595fb0 to 0xec595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856f8ac0 INFO: task kworker/0:863:5595 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: db8ed000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:864:5597 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:864 state:D stack:0 pid:5597 tgid:5597 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec59dd84 r8:00000002 r7:60000113 r6:ec59dd8c r5:856bbc00 r4:856bbc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856bbc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec59de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f8f40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3b5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575fb8c r4:8575f800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575fb8c r4:857b6880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856bbc00 r8:857b68ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b6880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b6880 r8:80287e08 r7:ec58de60 r6:857c8e80 r5:856bbc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec59dfb0 to 0xec59dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856f8e80 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:dffe1dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:865:5599 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:865 state:D stack:0 pid:5599 tgid:5599 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5add84 r8:00000002 r7:60000113 r6:ec5add8c r5:856b9800 r4:856b9800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856b9800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5ade08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f83c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3dd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575ff8c r4:8575fc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575ff8c r4:857b6900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b9800 r8:857b692c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b6900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b6900 r8:80287e08 r7:ec58de60 r6:857c8f00 r5:856b9800 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r5:85d2778c r4:85d27400 r4:848d9e00 r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:856ba400 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d1bc0 r5:8472678c r4:84726400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:856ba400 r8:857b69ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: dc669000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:867:5603 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:867 state:D stack:0 pid:5603 tgid:5603 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5b9d84 r8:00000002 r7:60000113 r6:ec5b9d8c r5:857f0000 r4:857f0000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857f0000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5b9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c0b80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:857f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb65000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576e78c r4:8576e400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576e78c r4:857b6a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857f0000 r8:857b6a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b6a00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b6a00 r8:80287e08 r7:ec58de60 r6:857b8000 r5:857f0000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5b9fb0 to 0xec5b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446ba00 INFO: task kworker/0:867:5603 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: dc669000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 r5:85d2778c r4:85d27400 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 Exception stack(0xdffe1fb0 to 0xdffe1ff8) r4:848cab40 Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:857f1800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5c1e08 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r9:83018005 r8:857f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r5:8576c78c r4:8576c400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576c78c r4:857b6a80 r10:61c88647 r9:857f1800 r8:857b6aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5c1fb0 to 0xec5c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857c0080 INFO: task kworker/0:868:5605 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: dc942000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:869:5607 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:869 state:D stack:0 pid:5607 tgid:5607 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5d1d84 r8:00000002 r7:60000113 r6:ec5d1d8c r5:857f0c00 r4:857f0c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8576cb8c r4:8576c800 r7:dddced80 r6:83018000 r5:8576cb8c r4:857b6b00 r10:00000000 r9:857b6b00 r8:80287e08 r7:ec5b9e60 r6:857b8100 r5:857f0c00 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576cf8c r4:8576cc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:857b6b80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b6b80 r8:80287e08 r7:ec5b9e60 r6:857b8180 r5:857f3c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5e1fb0 to 0xec5e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857c0140 INFO: task kworker/0:870:5609 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: dd3b6000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:857f4800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5e9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c05c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:857f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb95d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576d38c r4:8576d000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576d38c r4:857b6c00 r10:61c88647 r9:857f4800 r8:857b6c2c r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:871:5611 is blocked on a mutex likely owned by task kworker/0:115:3602. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:857f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 r5:8576d78c r4:8576d400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:857b6c80 Exception stack(0xec5f5fb0 to 0xec5f5ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:873:5615 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:873 state:D stack:0 pid:5615 tgid:5615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec609d84 r8:00000002 r7:60000113 r6:ec609d8c r5:857f3000 r4:857f3000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857f3000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:874:5617 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:874 state:D stack:0 pid:5617 tgid:5617 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec611d84 r8:00000002 r7:60000113 r6:ec611d8c r5:857f5400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec611e08 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576df8c r4:8576dc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576df8c r4:857b6d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857f5400 r8:857b6dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b6d80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b6d80 r8:80287e08 r7:ec5b9e60 r6:857b8380 r5:857f5400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec611fb0 to 0xec611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857c0680 INFO: task kworker/0:874:5617 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ddc0f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:875:5619 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:875 state:D stack:0 pid:5619 tgid:5619 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec619d84 r8:00000002 r7:60000113 r6:ec619d8c r5:857f6000 r4:857f6000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857f6000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec619e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c0a40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:857f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb57000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576e38c r4:8576e000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576e38c r4:857b6e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857f6000 r8:857b6e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b6e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b6e00 r8:80287e08 r7:ec5b9e60 r6:857b8400 r5:857f6000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec619fb0 to 0xec619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857c0940 INFO: task kworker/0:875:5619 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: dddae000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:876:5621 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:876 state:D stack:0 pid:5621 tgid:5621 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec629d84 r8:00000002 r7:60000113 r6:ec629d8c r5:856b3000 r4:856b3000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856b3000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec629e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c0c80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb87000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576ef8c r4:8576ec00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576ef8c r4:857b6f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b3000 r8:857b6f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b6f00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b6f00 r8:80287e08 r7:ec5b9e60 r6:857b8480 r5:856b3000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec629fb0 to 0xec629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857c0b80 INFO: task kworker/0:876:5621 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: dddae000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:877:5623 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:877 state:D stack:0 pid:5623 tgid:5623 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec645d84 r8:00000002 r7:60000113 r6:ec645d8c r5:84804800 r4:84804800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84804800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec645e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c0d40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84804800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb73000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576eb8c r4:8576e800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576eb8c r4:857b6e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84804800 r8:857b6eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b6e80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b6e80 r8:80287e08 r7:ec629e60 r6:857b8500 r5:84804800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec645fb0 to 0xec645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857c0a80 INFO: task kworker/0:877:5623 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: de053000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:878:5625 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:878 state:D stack:0 pid:5625 tgid:5625 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec64dd84 r8:00000002 r7:60000113 r6:ec64dd8c r5:857f8c00 r4:857f8c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857f8c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec64de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e42c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:857f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbc1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576ff8c r4:8576fc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576ff8c r4:857b6f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857f8c00 r8:857b6fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b6f80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b6f80 r8:80287e08 r7:ec629e60 r6:857b8580 r5:857f8c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec64dfb0 to 0xec64dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857c0c80 INFO: task kworker/0:878:5625 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: de053000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:879:5627 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:879 state:D stack:0 pid:5627 tgid:5627 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec655d84 r8:00000002 r7:60000113 r6:ec655d8c r5:857fa400 r4:857fa400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857fa400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec655e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c0f40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:857fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576f38c r4:8576f000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576f38c r4:857df000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857fa400 r8:857df02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857df000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857df000 r8:80287e08 r7:ec64de60 r6:857b8600 r5:857fa400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec655fb0 to 0xec655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857c0e80 INFO: task kworker/0:879:5627 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: de4b2000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:880:5630 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:880 state:D stack:0 pid:5630 tgid:5630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec661d84 r8:00000002 r7:60000113 r6:ec661d8c r5:857f9800 r4:857f9800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857f9800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec661e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f8040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:857f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebba3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576f78c r4:8576f400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576f78c r4:857df080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857f9800 r8:857df0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857df080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857df080 r8:80287e08 r7:ec64de60 r6:857b8680 r5:857f9800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec661fb0 to 0xec661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856f8f00 INFO: task kworker/0:880:5630 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: de4b2000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:881:5631 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:881 state:D stack:0 pid:5631 tgid:5631 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec665d84 r8:00000002 r7:60000013 r6:ec665d8c r5:857fb000 r4:857fb000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857fb000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec665e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e4540 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:857fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbe3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589c78c r4:8589c400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589c78c r4:857df100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857fb000 r8:857df12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857df100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857df100 r8:80287e08 r7:ec64de60 r6:857b8700 r5:857fb000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec665fb0 to 0xec665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857e4080 INFO: task kworker/0:881:5631 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: de702000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:882:5634 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:882 state:D stack:0 pid:5634 tgid:5634 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec66dd84 r8:00000002 r7:60000113 r6:ec66dd8c r5:857fc800 r4:857fc800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857fc800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec66de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e4440 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:857fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbcf000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589c38c r4:8589c000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589c38c r4:857df180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857fc800 r8:857df1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857df180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857df180 r8:80287e08 r7:ec665e60 r6:857b8780 r5:857fc800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec66dfb0 to 0xec66dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857e4140 INFO: task kworker/0:882:5634 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: debae000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:883:5636 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:883 state:D stack:0 pid:5636 tgid:5636 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec675d84 r8:00000002 r7:60000113 r6:ec675d8c r5:857fbc00 r4:857fbc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857fbc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec675e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85865f40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:857fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba5d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589eb8c r4:8589e800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589eb8c r4:857df200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857fbc00 r8:857df22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857df200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857df200 r8:80287e08 r7:ec665e60 r6:857b8800 r5:857fbc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec675fb0 to 0xec675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857e4240 INFO: task kworker/0:883:5636 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: dee44000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:884:5638 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:884 state:D stack:0 pid:5638 tgid:5638 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec67dd84 r8:00000002 r7:60000013 r6:ec67dd8c r5:857fd400 r4:857fd400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857fd400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec67de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e4680 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:857fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbf1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589cb8c r4:8589c800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589cb8c r4:857df280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857fd400 r8:857df2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857df280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857df280 r8:80287e08 r7:ec675e60 r6:857b8880 r5:857fd400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec67dfb0 to 0xec67dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857e4340 INFO: task kworker/0:884:5638 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: defb3000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:885:5640 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:885 state:D stack:0 pid:5640 tgid:5640 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec685d84 r8:00000002 r7:60000113 r6:ec685d8c r5:857fe000 r4:857fe000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857fe000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec685e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e4800 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:857fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc23000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589cf8c r4:8589cc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589cf8c r4:857df300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857fe000 r8:857df32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857df300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857df300 r8:80287e08 r7:ec675e60 r6:857b8980 r5:857fe000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec685fb0 to 0xec685ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857e4500 INFO: task kworker/0:885:5640 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: defb3000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:371:5641 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:371 state:D stack:0 pid:5641 tgid:5641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec689d84 r8:00000002 r7:60000113 r6:ec689d8c r5:857f8000 r4:857f8000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857f8000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec689e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85861e00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05cb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8578238c r4:85782000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578238c r4:857b8900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857f8000 r8:857b892c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857b8900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b8900 r8:80287e08 r7:ec575e60 r6:857b8a00 r5:857f8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec689fb0 to 0xec689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85861240 INFO: task kworker/1:371:5641 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: defb3000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:886:5643 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:886 state:D stack:0 pid:5643 tgid:5643 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec691d84 r8:00000002 r7:60000113 r6:ec691d8c r5:857fec00 r4:857fec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857fec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec691e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e4900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:857fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc3f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589d38c r4:8589d000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589d38c r4:857df380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857fec00 r8:857df3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857df380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857df380 r8:80287e08 r7:ec675e60 r6:857b8a80 r5:857fec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec691fb0 to 0xec691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857e4600 INFO: task kworker/0:886:5643 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: defb3000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:887:5645 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:887 state:D stack:0 pid:5645 tgid:5645 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6a1d84 r8:00000002 r7:60000113 r6:ec6a1d8c r5:85800c00 r4:85800c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85800c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e4a40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85800c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5d9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589d78c r4:8589d400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589d78c r4:857df400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85800c00 r8:857df42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857df400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857df400 r8:80287e08 r7:ec675e60 r6:857b8b00 r5:85800c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6a1fb0 to 0xec6a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857e4700 INFO: task kworker/0:887:5645 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: df6d1000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:888:5647 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:888 state:D stack:0 pid:5647 tgid:5647 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6a9d84 r8:00000002 r7:60000113 r6:ec6a9d8c r5:85800000 r4:85800000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85800000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e4b80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85800000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec621000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589db8c r4:8589d800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589db8c r4:857df480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85800000 r8:857df4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857df480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857df480 r8:80287e08 r7:ec675e60 r6:857b8b80 r5:85800000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6a9fb0 to 0xec6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857e48c0 INFO: task kworker/0:888:5647 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: dfa9a000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:889:5649 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:889 state:D stack:0 pid:5649 tgid:5649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6c1d84 r8:00000002 r7:60000113 r6:ec6c1d8c r5:85801800 r4:85801800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85801800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6c1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e4a00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85801800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6b3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589df8c r4:8589dc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589df8c r4:857df500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85801800 r8:857df52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857df500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857df500 r8:80287e08 r7:ec675e60 r6:857b8c00 r5:85801800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6c1fb0 to 0xec6c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857e4c00 INFO: task kworker/0:889:5649 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: dfc58000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:890:5651 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:890 state:D stack:0 pid:5651 tgid:5651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6e9d84 r8:00000002 r7:60000013 r6:ec6e9d8c r5:85802400 r4:85802400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85802400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6e9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e4dc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85802400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6c3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589e38c r4:8589e000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589e38c r4:857df600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85802400 r8:857df62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857df600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857df600 r8:80287e08 r7:ec675e60 r6:857b8c80 r5:85802400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6e9fb0 to 0xec6e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857e4b40 INFO: task kworker/0:890:5651 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: dfc58000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:372:5655 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:372 state:D stack:0 pid:5655 tgid:5655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6d5d84 r8:00000002 r7:60000013 r6:ec6d5d8c r5:85804800 r4:85804800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85804800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6d5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85861740 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85804800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa65000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8578278c r4:85782400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578278c r4:857b8d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85804800 r8:857b8d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857b8d00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b8d00 r8:80287e08 r7:ec575e60 r6:857b8d80 r5:85804800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6d5fb0 to 0xec6d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85861900 INFO: task kworker/1:372:5655 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: dff55000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:373:5658 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:373 state:D stack:0 pid:5658 tgid:5658 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcf9d84 r8:00000002 r7:60000113 r6:ebcf9d8c r5:85805400 r4:85805400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85805400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcf9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85861200 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85805400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85782f8c r4:85782c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85782f8c r4:857b8e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85805400 r8:857b8e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857b8e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b8e00 r8:80287e08 r7:ec575e60 r6:857b8e80 r5:85805400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcf9fb0 to 0xebcf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85861940 INFO: task kworker/1:373:5658 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: dff55000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:374:5659 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:374 state:D stack:0 pid:5659 tgid:5659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec571d84 r8:00000002 r7:60000113 r6:ec571d8c r5:85806000 r4:85806000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85806000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec571e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83d5d040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85806000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8578378c r4:85783400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578378c r4:857b8f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85806000 r8:857b8f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857b8f00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b8f00 r8:80287e08 r7:ebcf9e60 r6:857b8f80 r5:85806000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec571fb0 to 0xec571ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85861940 INFO: task kworker/1:374:5659 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e0265000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:891:5661 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:891 state:D stack:0 pid:5661 tgid:5661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc79d84 r8:00000002 r7:60000113 r6:ebc79d8c r5:8583d400 r4:8583d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8583d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc79e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85865e80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8583d400 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba47000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589e78c r4:8589e400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589e78c r4:857df580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8583d400 r8:857df5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857df580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857df580 r8:80287e08 r7:ec675e60 r6:857df680 r5:8583d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc79fb0 to 0xebc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857e4ec0 INFO: task kworker/0:891:5661 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e04ea000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:375:5662 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:375 state:D stack:0 pid:5662 tgid:5662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc85d84 r8:00000002 r7:60000113 r6:ebc85d8c r5:847fb000 r4:847fb000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847fb000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc85e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85861c80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:847fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb17d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8578338c r4:85783000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578338c r4:8586d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847fb000 r8:8586d02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8586d000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586d000 r8:80287e08 r7:ec571e60 r6:857df700 r5:847fb000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc85fb0 to 0xebc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85861640 INFO: task kworker/1:375:5662 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e0759000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:376:5664 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:376 state:D stack:0 pid:5664 tgid:5664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc61d84 r8:00000002 r7:60000113 r6:ebc61d8c r5:85806c00 r4:85806c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85806c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc61e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586b0c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85806c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb561000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85783b8c r4:85783800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85783b8c r4:8586d080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85806c00 r8:8586d0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8586d080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586d080 r8:80287e08 r7:ec571e60 r6:8586d100 r5:85806c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc61fb0 to 0xebc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857e4fc0 INFO: task kworker/1:376:5664 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e09ee000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:377:5668 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:377 state:D stack:0 pid:5668 tgid:5668 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6fdd84 r8:00000002 r7:60000113 r6:ec6fdd8c r5:84aa9800 r4:84aa9800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aa9800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6fde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586b400 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84aa9800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5fb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8442df8c r4:8442dc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8442df8c r4:8586d180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aa9800 r8:8586d1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8586d180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586d180 r8:80287e08 r7:ebc61e60 r6:857df780 r5:84aa9800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6fdfb0 to 0xec6fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8586b1c0 INFO: task kworker/1:377:5668 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e09ee000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:378:5669 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:378 state:D stack:0 pid:5669 tgid:5669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec51dd84 r8:00000002 r7:60000013 r6:ec51dd8c r5:85803c00 r4:85803c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85803c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec51de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586b280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85803c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5d7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85783f8c r4:85783c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85783f8c r4:8586d200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85803c00 r8:8586d22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8586d200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586d200 r8:80287e08 r7:ec6fde60 r6:8586d280 r5:85803c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec51dfb0 to 0xec51dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8586b340 INFO: task kworker/1:378:5669 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e0cb4000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:379:5671 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:379 state:D stack:0 pid:5671 tgid:5671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6f5d84 r8:00000002 r7:60000113 r6:ec6f5d8c r5:85803000 r4:85803000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85803000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6f5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586b780 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85803000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb66d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579878c r4:85798400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8579878c r4:8586d300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85803000 r8:8586d32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8586d300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586d300 r8:80287e08 r7:ec6fde60 r6:8586d380 r5:85803000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6f5fb0 to 0xec6f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8586b200 INFO: task kworker/1:379:5671 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e0f4a000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:380:5673 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:380 state:D stack:0 pid:5673 tgid:5673 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec705d84 r8:00000002 r7:60000013 r6:ec705d8c r5:85808000 r4:85808000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85808000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec705e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586b580 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85808000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb627000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579838c r4:85798000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8579838c r4:8586d400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85808000 r8:8586d42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8586d400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586d400 r8:80287e08 r7:ec6f5e60 r6:8586d480 r5:85808000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec705fb0 to 0xec705ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8586b200 INFO: task kworker/1:380:5673 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e128f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:381:5676 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:381 state:D stack:0 pid:5676 tgid:5676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec709d84 r8:00000002 r7:60000013 r6:ec709d8c r5:85808c00 r4:85808c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85808c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec709e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586b880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85808c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6a3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85798b8c r4:85798800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85798b8c r4:8586d500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85808c00 r8:8586d52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8586d500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586d500 r8:80287e08 r7:ec6f5e60 r6:8586d580 r5:85808c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec709fb0 to 0xec709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8586b600 INFO: task kworker/1:381:5676 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e1742000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:382:5677 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:382 state:D stack:0 pid:5677 tgid:5677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc75d84 r8:00000002 r7:60000013 r6:ebc75d8c r5:85809800 r4:85809800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85809800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc75e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586b680 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85809800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6db000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85798f8c r4:85798c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85798f8c r4:8586d600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85809800 r8:8586d62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8586d600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586d600 r8:80287e08 r7:ec709e60 r6:8586d680 r5:85809800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc75fb0 to 0xebc75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8586b840 INFO: task kworker/1:382:5677 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e1742000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:383:5679 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:383 state:D stack:0 pid:5679 tgid:5679 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec70dd84 r8:00000002 r7:60000113 r6:ec70dd8c r5:8580a400 r4:8580a400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8580a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec70de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586bd00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8580a400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb72f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579978c r4:85799400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8579978c r4:8586d700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8580a400 r8:8586d72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8586d700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586d700 r8:80287e08 r7:ebc75e60 r6:8586d780 r5:8580a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec70dfb0 to 0xec70dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8586ba00 INFO: task kworker/1:383:5679 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e1c20000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:384:5681 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:384 state:D stack:0 pid:5681 tgid:5681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec715d84 r8:00000002 r7:60000013 r6:ec715d8c r5:8580b000 r4:8580b000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8580b000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec715e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586bb40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8580b000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb703000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579938c r4:85799000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8579938c r4:8586d800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8580b000 r8:8586d82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8586d800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586d800 r8:80287e08 r7:ec70de60 r6:8586d880 r5:8580b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec715fb0 to 0xec715ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8586b980 INFO: task kworker/1:384:5681 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e1c20000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:385:5683 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:385 state:D stack:0 pid:5683 tgid:5683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec719d84 r8:00000002 r7:60000013 r6:ec719d8c r5:8580bc00 r4:8580bc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8580bc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec719e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586bf00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8580bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb755000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85799b8c r4:85799800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85799b8c r4:8586d900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8580bc00 r8:8586d92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8586d900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586d900 r8:80287e08 r7:ec70de60 r6:8586d980 r5:8580bc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec719fb0 to 0xec719ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8586be00 INFO: task kworker/1:385:5683 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e1d28000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:386:5684 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:386 state:D stack:0 pid:5684 tgid:5684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec711d84 r8:00000002 r7:60000013 r6:ec711d8c r5:8580c800 r4:8580c800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8580c800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec711e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bd440 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8580c800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85799f8c r4:85799c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85799f8c r4:8586da00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8580c800 r8:8586da2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8586da00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586da00 r8:80287e08 r7:ec719e60 r6:8586da80 r5:8580c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec711fb0 to 0xec711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8586be00 INFO: task kworker/1:386:5684 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e1ff9000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:387:5687 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:387 state:D stack:0 pid:5687 tgid:5687 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec71dd84 r8:00000002 r7:60000013 r6:ec71dd8c r5:8580d400 r4:8580d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8580d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec71de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c0fc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8580d400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb805000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579a38c r4:8579a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8579a38c r4:8586db00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8580d400 r8:8586db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8586db00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586db00 r8:80287e08 r7:ec711e60 r6:8586db80 r5:8580d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec71dfb0 to 0xec71dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857bd4c0 INFO: task kworker/1:387:5687 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e2333000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:388:5689 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:388 state:D stack:0 pid:5689 tgid:5689 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec725d84 r8:00000002 r7:60000013 r6:ec725d8c r5:8580e000 r4:8580e000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8580e000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec725e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857da1c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8580e000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb837000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579a78c r4:8579a400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8579a78c r4:8586dc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8580e000 r8:8586dc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8586dc00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586dc00 r8:80287e08 r7:ec71de60 r6:8586dc80 r5:8580e000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec725fb0 to 0xec725ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857da100 INFO: task kworker/1:388:5689 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e280f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:389:5691 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:389 state:D stack:0 pid:5691 tgid:5691 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec729d84 r8:00000002 r7:60000013 r6:ec729d8c r5:8580ec00 r4:8580ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8580ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec729e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857da380 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8580ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb859000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579ab8c r4:8579a800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8579ab8c r4:8586dd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8580ec00 r8:8586dd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8586dd00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586dd00 r8:80287e08 r7:ec725e60 r6:8586dd80 r5:8580ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec729fb0 to 0xec729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857da200 INFO: task kworker/1:389:5691 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e280f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:390:5693 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:390 state:D stack:0 pid:5693 tgid:5693 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec72dd84 r8:00000002 r7:60000113 r6:ec72dd8c r5:85810000 r4:85810000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85810000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec72de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857da4c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85810000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8bf000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579af8c r4:8579ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8579af8c r4:8586de00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85810000 r8:8586de2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8586de00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586de00 r8:80287e08 r7:ec729e60 r6:8586de80 r5:85810000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec72dfb0 to 0xec72dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857da0c0 INFO: task kworker/1:390:5693 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e280f000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:391:5695 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:391 state:D stack:0 pid:5695 tgid:5695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec731d84 r8:00000002 r7:60000013 r6:ec731d8c r5:85811800 r4:85811800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85811800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec731e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857da700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85811800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9d3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579b38c r4:8579b000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8579b38c r4:8586df00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85811800 r8:8586df2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8586df00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586df00 r8:80287e08 r7:ec72de60 r6:8586df80 r5:85811800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec731fb0 to 0xec731ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857da340 INFO: task kworker/1:391:5695 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e2c84000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:392:5697 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:392 state:D stack:0 pid:5697 tgid:5697 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec735d84 r8:00000002 r7:60000113 r6:ec735d8c r5:85810c00 r4:85810c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85810c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec735e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d3b80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85810c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcfb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a578c r4:857a5400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857a578c r4:857c5000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85810c00 r8:857c502c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c5000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c5000 r8:80287e08 r7:ec731e60 r6:857c5080 r5:85810c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec735fb0 to 0xec735ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857da0c0 INFO: task kworker/1:392:5697 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e30d6000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:393:5698 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:393 state:D stack:0 pid:5698 tgid:5698 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec721d84 r8:00000002 r7:60000013 r6:ec721d8c r5:85813000 r4:85813000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85813000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec721e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857da880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85813000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9ed000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579b78c r4:8579b400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8579b78c r4:857c5100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85813000 r8:857c512c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c5100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c5100 r8:80287e08 r7:ec735e60 r6:857c5180 r5:85813000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec721fb0 to 0xec721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857da680 INFO: task kworker/1:393:5698 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e30d6000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:394:5699 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:394 state:D stack:0 pid:5699 tgid:5699 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec73dd84 r8:00000002 r7:60000013 r6:ec73dd8c r5:85814800 r4:85814800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85814800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec73de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857dab80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85814800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba0f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579bb8c r4:8579b800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8579bb8c r4:857c5200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85814800 r8:857c522c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c5200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c5200 r8:80287e08 r7:ec735e60 r6:857c5280 r5:85814800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec73dfb0 to 0xec73dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857da8c0 INFO: task kworker/1:394:5699 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e3a37000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:395:5703 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:395 state:D stack:0 pid:5703 tgid:5703 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec749d84 r8:00000002 r7:60000113 r6:ec749d8c r5:85816000 r4:85816000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85816000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec749e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857daf80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85816000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba75000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579bf8c r4:8579bc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8579bf8c r4:857c5300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85816000 r8:857c532c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c5300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c5300 r8:80287e08 r7:ec735e60 r6:857c5380 r5:85816000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec749fb0 to 0xec749ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857dac00 INFO: task kworker/1:395:5703 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e3d22000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:892:5704 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:892 state:D stack:0 pid:5704 tgid:5704 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec74dd84 r8:00000002 r7:60000113 r6:ec74dd8c r5:85816c00 r4:85816c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85816c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec74de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f33c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85816c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac87000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589f78c r4:8589f400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589f78c r4:857df800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85816c00 r8:857df82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857df800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857df800 r8:80287e08 r7:ec675e60 r6:857c5400 r5:85816c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec74dfb0 to 0xec74dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85865dc0 INFO: task kworker/0:892:5704 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e4026000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:396:5708 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:396 state:D stack:0 pid:5708 tgid:5708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec751d84 r8:00000002 r7:60000013 r6:ec751d8c r5:85813c00 r4:85813c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85813c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec751e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857daac0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85813c00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba93000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a438c r4:857a4000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857a438c r4:857c5480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85813c00 r8:857c54ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c5480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c5480 r8:80287e08 r7:ec735e60 r6:857c5500 r5:85813c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec751fb0 to 0xec751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857dae80 INFO: task kworker/1:396:5708 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e4256000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:893:5709 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:893 state:D stack:0 pid:5709 tgid:5709 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec755d84 r8:00000002 r7:60000113 r6:ec755d8c r5:85818000 r4:85818000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85818000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec755e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85865e40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85818000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebab3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a4b8c r4:857a4800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a4b8c r4:857df880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85818000 r8:857df8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857df880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857df880 r8:80287e08 r7:ec74de60 r6:857c5580 r5:85818000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec755fb0 to 0xec755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85865dc0 INFO: task kworker/0:893:5709 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e4855000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:397:5710 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:397 state:D stack:0 pid:5710 tgid:5710 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec759d84 r8:00000002 r7:60000013 r6:ec759d8c r5:85818c00 r4:85818c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85818c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec759e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d33c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85818c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba9f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a478c r4:857a4400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857a478c r4:857c5600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85818c00 r8:857c562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c5600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c5600 r8:80287e08 r7:ec735e60 r6:857c5680 r5:85818c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec759fb0 to 0xec759ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857d30c0 INFO: task kworker/1:397:5710 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e510a000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:398:5712 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:398 state:D stack:0 pid:5712 tgid:5712 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec761d84 r8:00000002 r7:60000113 r6:ec761d8c r5:8581a400 r4:8581a400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8581a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec761e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d3900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8581a400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc87000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a4f8c r4:857a4c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857a4f8c r4:857c5700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8581a400 r8:857c572c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c5700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c5700 r8:80287e08 r7:ec735e60 r6:857c5780 r5:8581a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec761fb0 to 0xec761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857d3340 INFO: task kworker/1:398:5712 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e52e8000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:894:5713 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:894 state:D stack:0 pid:5713 tgid:5713 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec769d84 r8:00000002 r7:60000013 r6:ec769d8c r5:8581bc00 r4:8581bc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8581bc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec769e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f3300 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8581bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4877000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589f38c r4:8589f000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589f38c r4:857df900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8581bc00 r8:857df92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857df900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857df900 r8:80287e08 r7:ec74de60 r6:857c5800 r5:8581bc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec769fb0 to 0xec769ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85865dc0 INFO: task kworker/0:894:5713 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e55be000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:399:5716 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:399 state:D stack:0 pid:5716 tgid:5716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec765d84 r8:00000002 r7:60000013 r6:ec765d8c r5:85819800 r4:85819800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85819800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec765e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d3a40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85819800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcdf000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a538c r4:857a5000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857a538c r4:857c5880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85819800 r8:857c58ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c5880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c5880 r8:80287e08 r7:ec735e60 r6:857c5900 r5:85819800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec765fb0 to 0xec765ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857d3780 INFO: task kworker/1:399:5716 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e576d000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:400:5720 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:400 state:D stack:0 pid:5720 tgid:5720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec741d84 r8:00000002 r7:60000113 r6:ec741d8c r5:8581c800 r4:8581c800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8581c800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec741e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d3c80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8581c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec51f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a5b8c r4:857a5800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857a5b8c r4:857c5980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8581c800 r8:857c59ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c5980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c5980 r8:80287e08 r7:ec735e60 r6:857c5a00 r5:8581c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec741fb0 to 0xec741ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857d3a00 INFO: task kworker/1:400:5720 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e5a9d000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8581d400 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xec76dfb0 to 0xec76dff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e5eee000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:402:5723 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:402 state:D stack:0 pid:5723 tgid:5723 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec771d84 r8:00000002 r7:60000113 r6:ec771d8c r5:8581e000 r4:8581e000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8581e000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec771e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d3240 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8581e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec551000 r5:857a638c r4:857a6000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8581e000 r8:857c5bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: e6100000 ed6eb000 00000001 80239b98 7f047000 00000001 r4:dffe1dc0 r5:00001000 r4:eb64f000 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8581ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec799000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a738c r4:857a7000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857a738c r4:857c5c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8581ec00 r8:857c5cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c5c80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c5c80 r8:80287e08 r7:ec771e60 r6:857c5d00 r5:8581ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec775fb0 to 0xec775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857d3ec0 INFO: task kworker/1:403:5725 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e63fa000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d3540 r5:857a678c r4:857a6400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:857c5d80 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857a6b8c r4:857a6800 r10:61c88647 r9:85812400 r8:857c5eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:00000000 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:406:5730 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:406 state:D stack:0 pid:5730 tgid:5730 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec791d84 r8:00000002 r7:60000113 r6:ec791d8c r5:85820000 r4:85820000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85820000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec791e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857dab40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85820000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab13000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a6f8c r4:857a6c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857a6f8c r4:857c5f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85820000 r8:857c5fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857c5f80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c5f80 r8:80287e08 r7:ec775e60 r6:857b0000 r5:85820000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: e6d1e000 ed6eb000 00000001 80239b98 7f047000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) r4:848cab40 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:857a778c r4:857a7400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:857b0080 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:408:5737 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:408 state:D stack:0 pid:5737 tgid:5737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec659d84 r8:00000002 r7:60000113 r6:ec659d8c r5:85822400 r4:85822400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85822400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec659e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85973040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85822400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcfd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858fc38c r4:858fc000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fc38c r4:857b0180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85822400 r8:857b01ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e63c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85823000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb951000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a7b8c r4:857a7800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857a7b8c r4:857b0280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85823000 r8:857b02ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857b0280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b0280 r8:80287e08 r7:ec659e60 r6:857b0300 r5:85823000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec65dfb0 to 0xec65dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857bb500 INFO: task kworker/1:409:5738 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e760b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r4:85820c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec695e08 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xec695fb0 to 0xec695ff8) task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb58f000 r5:858a578c r4:858a5400 r10:61c88647 r9:85823c00 r8:857dfa2c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e7ec7000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:897:5743 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:897 state:D stack:0 pid:5743 tgid:5743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7b1d84 r8:00000002 r7:60000013 r6:ec7b1d8c r5:85825400 r4:85825400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85825400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7b1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f3680 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85825400 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb003000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589ff8c r4:8589fc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589ff8c r4:857dfa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85825400 r8:857dfaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dfa80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dfa80 r8:80287e08 r7:ec7ade60 r6:857b0480 r5:85825400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8472538c r4:857dfb00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:899 state:D stack:0 pid:5747 tgid:5747 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7c1d84 r8:00000002 r7:60000013 r6:ec7c1d8c r5:85826000 r4:85826000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85826000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f3900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85826000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2b9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a438c r4:858a4000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a438c r4:857dfb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85826000 r8:857dfbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dfb80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dfb80 r8:80287e08 r7:ec7ade60 r6:857b0580 r5:85826000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7c1fb0 to 0xec7c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856f35c0 INFO: task kworker/0:899:5747 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e833b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 r5:85d2778c r4:85d27400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c9e08 r5:00001000 r4:eb367000 r5:858a478c r4:858a4400 r10:61c88647 r9:85918c00 r8:857dfc2c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:00000000 r5:85d2778c r4:85d27400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:901:5751 blocked for more than 473 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:901 state:D stack:0 pid:5751 tgid:5751 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7d1d84 r8:00000002 r7:60000113 r6:ec7d1d8c r5:85918000 r4:85918000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85918000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7d1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f3bc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85918000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3a7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a4b8c r4:858a4800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a4b8c r4:857dfc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85918000 r8:857dfcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dfc80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dfc80 r8:80287e08 r7:ec7ade60 r6:857b0680 r5:85918000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7d1fb0 to 0xec7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856f3880 INFO: task kworker/0:901:5751 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7d9e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:858a4f8c r4:857dfd00 r10:00000000 r9:857dfd00 r8:80287e08 r7:ec7ade60 r6:857b0700 r5:85919800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xdffe1d28 to 0xdffe1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8591a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7e1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f3e40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8591a400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a538c r4:858a5000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a538c r4:857dfd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8591a400 r8:857dfdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dfd80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dfd80 r8:80287e08 r7:ec7ade60 r6:857b0780 r5:8591a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7e1fb0 to 0xec7e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856f3ac0 INFO: task kworker/0:903:5755 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e8ebe000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/0:904:5758 blocked for more than 473 seconds. r5:8591b000 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8591b000 r8:857dfe2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:8591bc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7f5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bbd80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8591bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb96d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a5f8c r4:858a5c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a5f8c r4:857dfe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8591bc00 r8:857dfeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dfe80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dfe80 r8:80287e08 r7:ec7ede60 r6:857b0880 r5:8591bc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7f5fb0 to 0xec7f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856f3d40 INFO: task kworker/0:905:5760 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e91c1000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 r4:848d9e00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb863000 r5:857a7f8c r4:857a7c00 r10:61c88647 r9:8591e000 r8:857b092c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xec7fdfb0 to 0xec7fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857e6340 INFO: task kworker/1:410:5763 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e91c1000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:848cab40 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858a638c r4:858a6000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80070013 r4:80239bb0 r4:dffe1dc0 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 INFO: task kworker/0:907:5766 blocked for more than 473 seconds. r5:84aaa400 r4:8291a680 r4:00000000 r4:00000000 r5:858a678c r4:858a6400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:857dd000 r8:80287e08 r7:ec5b1e60 r6:857dd080 r5:84aaa400 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7f9fb0 to 0xec7f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446bc40 INFO: task kworker/0:907:5766 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e96d8000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:908:5769 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:908 state:D stack:0 pid:5769 tgid:5769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec801d84 r8:00000002 r7:60000113 r6:ec801d8c r5:84aad400 r4:84aad400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aad400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec801e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ce280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84aad400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858a6b8c r4:858a6800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:857dd100 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r5:80070013 r4:80239bb0 r4:dffe1dc0 r5:00001000 r4:eb64f000 r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:84aae000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec785e08 r5:00001000 r4:ebb8b000 r5:858a738c r4:858a7000 r10:61c88647 r9:84aae000 r8:857dd22c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r4:848d9e00 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/0:910:5771 blocked for more than 474 seconds. r4:84aaec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec80de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ce580 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84aaec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb7b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a6f8c r4:858a6c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a6f8c r4:857dd300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aaec00 r8:857dd32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dd300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dd300 r8:80287e08 r7:ec785e60 r6:857dd380 r5:84aaec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec80dfb0 to 0xec80dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857ce1c0 INFO: task kworker/0:910:5771 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: e9db4000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:911:5774 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:84aa8c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec809e08 r9:83018005 r8:84aa8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r5:858a7f8c r4:858a7c00 r10:61c88647 r9:84aa8c00 r8:857dd42c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: e9fe4000 ed6eb000 00000001 80239b98 7f047000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:912:5776 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:912 state:D stack:0 pid:5776 tgid:5776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec815d84 r8:00000002 r7:60000113 r6:ec815d8c r5:84aabc00 r4:84aabc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aabc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec815e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ce800 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84aabc00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebba1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a778c r4:858a7400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a778c r4:857dd500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aabc00 r8:857dd52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dd500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dd500 r8:80287e08 r7:ec809e60 r6:857dd580 r5:84aabc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec815fb0 to 0xec815ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857ce680 INFO: task kworker/0:912:5776 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebbb9000 r5:858a7b8c r4:858a7800 r10:61c88647 r9:84aa8000 r8:857dd62c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:914:5780 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:914 state:D stack:0 pid:5780 tgid:5780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec81dd84 r8:00000002 r7:60000013 r6:ec81dd8c r5:8591ec00 r4:8591ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8591ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec81de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857cee00 r5:858ac78c r4:858ac400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:857dd700 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ea69d000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:848cab40 Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: r4:8591c800 r5:8591c800 r4:8291a680 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ced40 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858ac38c r4:858ac000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8591c800 r8:857dd7ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:857dd780 r8:80287e08 r7:ec81de60 r6:857b0a80 r5:8591c800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdffe1d28 to 0xdffe1d70) 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:916:5784 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:916 state:D stack:0 pid:5784 tgid:5784 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec825d84 r8:00000002 r7:60000113 r6:ec825d8c r5:8591d400 r4:8591d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8591d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec825e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857cef80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8591d400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc31000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858acb8c r4:858ac800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858acb8c r4:857dd800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8591d400 r8:857dd82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dd800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dd800 r8:80287e08 r7:ec81de60 r6:857b0b00 r5:8591d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec825fb0 to 0xec825ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857ceac0 INFO: task kworker/0:916:5784 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ea8ff000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:917:5786 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:917 state:D stack:0 pid:5786 tgid:5786 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec82dd84 r8:00000002 r7:60000013 r6:ec82dd8c r5:85920000 r4:85920000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85920000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec82de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857cefc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85920000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebce7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858acf8c r4:858acc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858acf8c r4:857dd880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85920000 r8:857dd8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dd880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dd880 r8:80287e08 r7:ec825e60 r6:857b0b80 r5:85920000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec82dfb0 to 0xec82dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857cef40 INFO: task kworker/0:917:5786 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ea984000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:918:5788 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:918 state:D stack:0 pid:5788 tgid:5788 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec835d84 r8:00000002 r7:60000113 r6:ec835d8c r5:85921800 r4:85921800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85921800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec835e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868380 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85921800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec597000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858adb8c r4:858ad800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858adb8c r4:857dd900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85921800 r8:857dd92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dd900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dd900 r8:80287e08 r7:ec82de60 r6:857b0c00 r5:85921800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec835fb0 to 0xec835ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857ceac0 INFO: task kworker/0:918:5788 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: eadb3000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:919:5790 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:919 state:D stack:0 pid:5790 tgid:5790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec83dd84 r8:00000002 r7:60000113 r6:ec83dd8c r5:85920c00 r4:85920c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85920c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec83de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bbdc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85920c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec54b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858ad38c r4:858ad000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858ad38c r4:857dd980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85920c00 r8:857dd9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dd980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dd980 r8:80287e08 r7:ec835e60 r6:857b0c80 r5:85920c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec83dfb0 to 0xec83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857cea00 INFO: task kworker/0:919:5790 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: eb0b0000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:920:5791 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:920 state:D stack:0 pid:5791 tgid:5791 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec841d84 r8:00000002 r7:60000113 r6:ec841d8c r5:85923000 r4:85923000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85923000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec841e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868140 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85923000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec583000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858ad78c r4:858ad400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858ad78c r4:857dda00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85923000 r8:857dda2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dda00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dda00 r8:80287e08 r7:ec835e60 r6:857b0d00 r5:85923000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec841fb0 to 0xec841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85868080 INFO: task kworker/0:920:5791 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: eb5fb000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:921:5793 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:921 state:D stack:0 pid:5793 tgid:5793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec849d84 r8:00000002 r7:60000013 r6:ec849d8c r5:85922400 r4:85922400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85922400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec849e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868480 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85922400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5b3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858adf8c r4:858adc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858adf8c r4:857dda80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85922400 r8:857ddaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dda80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dda80 r8:80287e08 r7:ec835e60 r6:857b0d80 r5:85922400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec849fb0 to 0xec849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85868080 INFO: task kworker/0:921:5793 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ebb6d000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:922:5796 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:922 state:D stack:0 pid:5796 tgid:5796 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec855d84 r8:00000002 r7:60000013 r6:ec855d8c r5:85924800 r4:85924800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85924800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec855e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868580 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85924800 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb31000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858ae38c r4:858ae000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858ae38c r4:857ddb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85924800 r8:857ddb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ddb00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ddb00 r8:80287e08 r7:ec849e60 r6:857b0e00 r5:85924800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec855fb0 to 0xec855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85868280 INFO: task kworker/0:922:5796 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ec099000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:923:5798 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:923 state:D stack:0 pid:5798 tgid:5798 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6d9d84 r8:00000002 r7:60000113 r6:ec6d9d8c r5:85926000 r4:85926000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85926000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6d9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858686c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85926000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e071f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858ae78c r4:858ae400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858ae78c r4:857ddb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85926000 r8:857ddbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ddb80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ddb80 r8:80287e08 r7:ec855e60 r6:857b0e80 r5:85926000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6d9fb0 to 0xec6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85868300 INFO: task kworker/0:923:5798 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ec401000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:924:5800 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:924 state:D stack:0 pid:5800 tgid:5800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7a1d84 r8:00000002 r7:60000113 r6:ec7a1d8c r5:85925400 r4:85925400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85925400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7a1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85925400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858aeb8c r4:858ae800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858aeb8c r4:857ddc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85925400 r8:857ddc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ddc00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ddc00 r8:80287e08 r7:ec6d9e60 r6:857b0f00 r5:85925400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7a1fb0 to 0xec7a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85868540 INFO: task kworker/0:924:5800 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ec8a7000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:925:5802 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:925 state:D stack:0 pid:5802 tgid:5802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec819d84 r8:00000002 r7:60000113 r6:ec819d8c r5:85926c00 r4:85926c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85926c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec819e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868a40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85926c00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858aef8c r4:858aec00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858aef8c r4:857ddc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85926c00 r8:857ddcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ddc80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ddc80 r8:80287e08 r7:ec7a1e60 r6:857b0f80 r5:85926c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec819fb0 to 0xec819ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85868780 INFO: task kworker/0:925:5802 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ecd0b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:926:5804 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:926 state:D stack:0 pid:5804 tgid:5804 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec859d84 r8:00000002 r7:60000113 r6:ec859d8c r5:85923c00 r4:85923c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85923c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec859e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868b80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85923c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb54b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858af38c r4:858af000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858af38c r4:857ddd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85923c00 r8:857ddd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ddd00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ddd00 r8:80287e08 r7:ec819e60 r6:85871000 r5:85923c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec859fb0 to 0xec859ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85868540 INFO: task kworker/0:926:5804 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ecd0b000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:927:5807 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:927 state:D stack:0 pid:5807 tgid:5807 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec861d84 r8:00000002 r7:60000113 r6:ec861d8c r5:85928000 r4:85928000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85928000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec861e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85928000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6f3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b078c r4:858b0400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b078c r4:857ddd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85928000 r8:857dddac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ddd80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ddd80 r8:80287e08 r7:ec859e60 r6:85871080 r5:85928000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec861fb0 to 0xec861ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85868a00 INFO: task kworker/0:927:5807 is blocked on a mutex likely owned by task kworker/0:115:3602. task:kworker/0:115 state:R running task stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b29800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84b29800 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ed60c000 ed6eb000 00000001 80239b98 7f047000 00000001 1d40: 82ac15a0 7f047000 ed6eb000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2778c r4:85d27400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d2778c r4:848d9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:848d9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d9e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d9e00 r8:80287e08 r7:dffc9e60 r6:848d9e80 r5:84b29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:848cab40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:928:5809 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:928 state:D stack:0 pid:5809 tgid:5809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec869d84 r8:00000002 r7:60000113 r6:ec869d8c r5:85929800 r4:85929800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85929800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec869e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868c80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85929800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5df000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858af78c r4:858af400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858af78c r4:857dde00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85929800 r8:857dde2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dde00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dde00 r8:80287e08 r7:ec861e60 r6:85871100 r5:85929800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec869fb0 to 0xec869ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85868a80 INFO: task kworker/0:928:5809 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 7f435000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:929:5810 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:929 state:D stack:0 pid:5810 tgid:5810 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec86dd84 r8:00000002 r7:60000113 r6:ec86dd8c r5:8592a400 r4:8592a400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8592a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec86de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868e00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8592a400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb611000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858afb8c r4:858af800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858afb8c r4:857dde80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8592a400 r8:857ddeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dde80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dde80 r8:80287e08 r7:ec861e60 r6:85871180 r5:8592a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec86dfb0 to 0xec86dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85868a80 INFO: task kworker/0:929:5810 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 7f825000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:930:5812 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:930 state:D stack:0 pid:5812 tgid:5812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec875d84 r8:00000002 r7:60000113 r6:ec875d8c r5:85928c00 r4:85928c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85928c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec875e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868f00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85928c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb663000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858aff8c r4:858afc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858aff8c r4:857ddf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85928c00 r8:857ddf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ddf00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ddf00 r8:80287e08 r7:ec861e60 r6:85871200 r5:85928c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec875fb0 to 0xec875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85868c00 INFO: task kworker/0:930:5812 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 7f825000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:931:5814 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:931 state:D stack:0 pid:5814 tgid:5814 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec87dd84 r8:00000002 r7:60000113 r6:ec87dd8c r5:8592b000 r4:8592b000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8592b000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec87de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868680 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8592b000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6ab000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b038c r4:858b0000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b038c r4:857ddf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8592b000 r8:857ddfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ddf80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ddf80 r8:80287e08 r7:ec861e60 r6:85871280 r5:8592b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec87dfb0 to 0xec87dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85868e40 INFO: task kworker/0:931:5814 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 7fce0000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:932:5817 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:932 state:D stack:0 pid:5817 tgid:5817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec889d84 r8:00000002 r7:60000113 r6:ec889d8c r5:8592bc00 r4:8592bc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8592bc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec889e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8592bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8cf000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b1b8c r4:858b1800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b1b8c r4:8587c000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8592bc00 r8:8587c02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587c000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587c000 r8:80287e08 r7:ec861e60 r6:85871300 r5:8592bc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec889fb0 to 0xec889ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85881080 INFO: task kworker/0:932:5817 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 7fce0000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:933:5818 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:933 state:D stack:0 pid:5818 tgid:5818 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec88dd84 r8:00000002 r7:60000113 r6:ec88dd8c r5:8592e000 r4:8592e000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8592e000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec88de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881340 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8592e000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb725000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b0b8c r4:858b0800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b0b8c r4:8587c080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8592e000 r8:8587c0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587c080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587c080 r8:80287e08 r7:ec889e60 r6:85871380 r5:8592e000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec88dfb0 to 0xec88dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85881080 INFO: task kworker/0:933:5818 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 7fce0000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:934:5820 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:934 state:D stack:0 pid:5820 tgid:5820 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec895d84 r8:00000002 r7:60000113 r6:ec895d8c r5:8592c800 r4:8592c800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8592c800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec895e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881440 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8592c800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb75b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b0f8c r4:858b0c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b0f8c r4:8587c100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8592c800 r8:8587c12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587c100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587c100 r8:80287e08 r7:ec889e60 r6:85871400 r5:8592c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec895fb0 to 0xec895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:858811c0 INFO: task kworker/0:934:5820 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 7fce0000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:935:5822 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:935 state:D stack:0 pid:5822 tgid:5822 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec89dd84 r8:00000002 r7:60000113 r6:ec89dd8c r5:8592ec00 r4:8592ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8592ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec89de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881580 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8592ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7fd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b138c r4:858b1000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b138c r4:8587c180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8592ec00 r8:8587c1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587c180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587c180 r8:80287e08 r7:ec889e60 r6:85871480 r5:8592ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec89dfb0 to 0xec89dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85881240 INFO: task kworker/0:935:5822 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 80127000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:936:5824 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:936 state:D stack:0 pid:5824 tgid:5824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8a5d84 r8:00000002 r7:60000113 r6:ec8a5d8c r5:8592d400 r4:8592d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8592d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858816c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8592d400 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb82d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b178c r4:858b1400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b178c r4:8587c200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8592d400 r8:8587c22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587c200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587c200 r8:80287e08 r7:ec889e60 r6:85871500 r5:8592d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8a5fb0 to 0xec8a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85881400 INFO: task kworker/0:936:5824 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 80127000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:411:5827 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:411 state:D stack:0 pid:5827 tgid:5827 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6b9d84 r8:00000002 r7:60000113 r6:ec6b9d8c r5:85930000 r4:85930000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85930000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6b9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85964980 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85930000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebce1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858bc78c r4:858bc400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858bc78c r4:85871580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85930000 r8:858715ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85871580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85871580 r8:80287e08 r7:ec659e60 r6:85871600 r5:85930000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6b9fb0 to 0xec6b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85878e80 INFO: task kworker/1:411:5827 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 807bb000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:937:5829 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:937 state:D stack:0 pid:5829 tgid:5829 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8add84 r8:00000002 r7:60000113 r6:ec8add8c r5:85931800 r4:85931800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85931800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8ade08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881980 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85931800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9eb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b1f8c r4:858b1c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b1f8c r4:8587c280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85931800 r8:8587c2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587c280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587c280 r8:80287e08 r7:ec889e60 r6:85871680 r5:85931800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8adfb0 to 0xec8adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85881700 INFO: task kworker/0:937:5829 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 80c0f000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:938:5831 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:938 state:D stack:0 pid:5831 tgid:5831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8b5d84 r8:00000002 r7:60000113 r6:ec8b5d8c r5:85930c00 r4:85930c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85930c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8b5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881ac0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85930c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba67000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b2b8c r4:858b2800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b2b8c r4:8587c300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85930c00 r8:8587c32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587c300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587c300 r8:80287e08 r7:ec8ade60 r6:85871700 r5:85930c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8b5fb0 to 0xec8b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85881780 INFO: task kworker/0:938:5831 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 80c0f000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:939:5832 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:939 state:D stack:0 pid:5832 tgid:5832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8b9d84 r8:00000002 r7:60000113 r6:ec8b9d8c r5:85933000 r4:85933000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85933000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8b9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85933000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba11000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b238c r4:858b2000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b238c r4:8587c380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85933000 r8:8587c3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587c380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587c380 r8:80287e08 r7:ec8b5e60 r6:85871780 r5:85933000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8b9fb0 to 0xec8b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85881780 INFO: task kworker/0:939:5832 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 80c0f000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:940:5834 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:940 state:D stack:0 pid:5834 tgid:5834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8c1d84 r8:00000002 r7:60000113 r6:ec8c1d8c r5:85932400 r4:85932400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85932400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881c40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85932400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba53000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b278c r4:858b2400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b278c r4:8587c400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85932400 r8:8587c42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587c400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587c400 r8:80287e08 r7:ec8b5e60 r6:85871800 r5:85932400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8c1fb0 to 0xec8c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85881900 INFO: task kworker/0:940:5834 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 80f03000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:941:5836 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:941 state:D stack:0 pid:5836 tgid:5836 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8c9d84 r8:00000002 r7:60000113 r6:ec8c9d8c r5:85933c00 r4:85933c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85933c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85878780 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85933c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac33000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b378c r4:858b3400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b378c r4:8587c480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85933c00 r8:8587c4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587c480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587c480 r8:80287e08 r7:ec8b5e60 r6:85871880 r5:85933c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8c9fb0 to 0xec8c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85881ac0 INFO: task kworker/0:941:5836 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 80f03000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:942:5838 blocked for more than 474 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:942 state:D stack:0 pid:5838 tgid:5838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc45d84 r8:00000002 r7:60000113 r6:ebc45d8c r5:85936000 r4:85936000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85936000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc45e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881ec0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85936000 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfae3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b2f8c r4:858b2c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b2f8c r4:8587c500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85936000 r8:8587c52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587c500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587c500 r8:80287e08 r7:ec8c9e60 r6:85871900 r5:85936000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc45fb0 to 0xebc45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85881bc0 INFO: task kworker/0:942:5838 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 8139d000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:943:5840 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:943 state:D stack:0 pid:5840 tgid:5840 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7a5d84 r8:00000002 r7:60000013 r6:ec7a5d8c r5:85935400 r4:85935400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85935400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7a5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881540 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85935400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0093000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b338c r4:858b3000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b338c r4:8587c580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85935400 r8:8587c5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587c580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587c580 r8:80287e08 r7:ec8c9e60 r6:85871980 r5:85935400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7a5fb0 to 0xec7a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85881dc0 INFO: task kworker/0:943:5840 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 8139d000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:944:5841 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:944 state:D stack:0 pid:5841 tgid:5841 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7c5d84 r8:00000002 r7:60000113 r6:ec7c5d8c r5:85934800 r4:85934800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85934800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868ec0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85934800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae15000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b3b8c r4:858b3800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b3b8c r4:8587c600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85934800 r8:8587c62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587c600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587c600 r8:80287e08 r7:ec8c9e60 r6:85871a00 r5:85934800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7c5fb0 to 0xec7c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85881e80 INFO: task kworker/0:944:5841 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 81976000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:945:5845 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:945 state:D stack:0 pid:5845 tgid:5845 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8d5d84 r8:00000002 r7:60000013 r6:ec8d5d8c r5:85938c00 r4:85938c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85938c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85895940 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85938c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb931000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b578c r4:858b5400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b578c r4:8587c680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85938c00 r8:8587c6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587c680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587c680 r8:80287e08 r7:ec7c5e60 r6:85871a80 r5:85938c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8d5fb0 to 0xec8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85868fc0 INFO: task kworker/0:945:5845 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 81976000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:946:5846 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:946 state:D stack:0 pid:5846 tgid:5846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8d9d84 r8:00000002 r7:60000113 r6:ec8d9d8c r5:85939800 r4:85939800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85939800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85895040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85939800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb035000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b3f8c r4:858b3c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b3f8c r4:8587c700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85939800 r8:8587c72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587c700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587c700 r8:80287e08 r7:ec8d5e60 r6:85871b00 r5:85939800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8d9fb0 to 0xec8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85895080 INFO: task kworker/0:946:5846 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 81e0c000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:947:5848 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:947 state:D stack:0 pid:5848 tgid:5848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8e1d84 r8:00000002 r7:60000113 r6:ec8e1d8c r5:8593b000 r4:8593b000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8593b000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858952c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8593b000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1e9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b438c r4:858b4000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b438c r4:8587c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8593b000 r8:8587c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587c780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587c780 r8:80287e08 r7:ec8d5e60 r6:85871b80 r5:8593b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8e1fb0 to 0xec8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85895200 INFO: task kworker/0:947:5848 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 81e0c000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:948:5851 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:948 state:D stack:0 pid:5851 tgid:5851 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8edd84 r8:00000002 r7:60000113 r6:ec8edd8c r5:8593c800 r4:8593c800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8593c800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8ede08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85895440 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8593c800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb35f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b478c r4:858b4400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b478c r4:8587c800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8593c800 r8:8587c82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587c800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587c800 r8:80287e08 r7:ec8d5e60 r6:85871c00 r5:8593c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8edfb0 to 0xec8edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85895140 INFO: task kworker/0:948:5851 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 823f2000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:949:5852 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:949 state:D stack:0 pid:5852 tgid:5852 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8f1d84 r8:00000002 r7:60000113 r6:ec8f1d8c r5:8593a400 r4:8593a400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8593a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8f1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858955c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8593a400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3b7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b4b8c r4:858b4800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b4b8c r4:8587c880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8593a400 r8:8587c8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587c880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587c880 r8:80287e08 r7:ec8d5e60 r6:85871c80 r5:8593a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8f1fb0 to 0xec8f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85895240 INFO: task kworker/0:949:5852 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 823f2000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:950:5855 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:950 state:D stack:0 pid:5855 tgid:5855 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8fdd84 r8:00000002 r7:60000013 r6:ec8fdd8c r5:8593bc00 r4:8593bc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8593bc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8fde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858956c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8593bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb499000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b4f8c r4:858b4c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b4f8c r4:8587c900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8593bc00 r8:8587c92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587c900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587c900 r8:80287e08 r7:ec8d5e60 r6:85871d00 r5:8593bc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8fdfb0 to 0xec8fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:858953c0 INFO: task kworker/0:950:5855 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 825fa000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:951:5856 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:951 state:D stack:0 pid:5856 tgid:5856 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec901d84 r8:00000002 r7:60000113 r6:ec901d8c r5:85938000 r4:85938000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85938000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec901e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85895840 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85938000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb577000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b538c r4:858b5000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b538c r4:8587c980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85938000 r8:8587c9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587c980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587c980 r8:80287e08 r7:ec8d5e60 r6:85871d80 r5:85938000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec901fb0 to 0xec901ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:858954c0 INFO: task kworker/0:951:5856 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 829c0000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:952:5858 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:952 state:D stack:0 pid:5858 tgid:5858 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec909d84 r8:00000002 r7:60000113 r6:ec909d8c r5:8593d400 r4:8593d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8593d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec909e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85895c00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8593d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba9d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b5f8c r4:858b5c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b5f8c r4:8587ca00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8593d400 r8:8587ca2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587ca00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587ca00 r8:80287e08 r7:ec8d5e60 r6:85871e00 r5:8593d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec909fb0 to 0xec909ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85895640 INFO: task kworker/0:952:5858 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 82ceb000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:953:5860 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:953 state:D stack:0 pid:5860 tgid:5860 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8a1d84 r8:00000002 r7:60000013 r6:ec8a1d8c r5:85826c00 r4:85826c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85826c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85895a80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85826c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb965000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b5b8c r4:858b5800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b5b8c r4:8587ca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85826c00 r8:8587caac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587ca80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587ca80 r8:80287e08 r7:ec909e60 r6:8587cb00 r5:85826c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8a1fb0 to 0xec8a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85895740 INFO: task kworker/0:953:5860 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 82ceb000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:954:5863 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:954 state:D stack:0 pid:5863 tgid:5863 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec90dd84 r8:00000002 r7:60000113 r6:ec90dd8c r5:84aab000 r4:84aab000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aab000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec90de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85964040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84aab000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb89000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b6f8c r4:858b6c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b6f8c r4:8587cb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aab000 r8:8587cbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587cb80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587cb80 r8:80287e08 r7:ec909e60 r6:8587cc00 r5:84aab000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec90dfb0 to 0xec90dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85895a00 INFO: task kworker/0:954:5863 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 830cb000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:955:5864 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:955 state:D stack:0 pid:5864 tgid:5864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec829d84 r8:00000002 r7:60000113 r6:ec829d8c r5:85815400 r4:85815400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85815400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec829e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85895d00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85815400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebabb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b638c r4:858b6000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b638c r4:8587cc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85815400 r8:8587ccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587cc80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587cc80 r8:80287e08 r7:ec90de60 r6:8587cd00 r5:85815400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec829fb0 to 0xec829ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85895a00 INFO: task kworker/0:955:5864 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 830cb000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:956:5867 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:956 state:D stack:0 pid:5867 tgid:5867 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec915d84 r8:00000002 r7:60000013 r6:ec915d8c r5:857f6c00 r4:857f6c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857f6c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec915e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85895f80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:857f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb4b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b678c r4:858b6400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b678c r4:8587cd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857f6c00 r8:8587cdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587cd80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587cd80 r8:80287e08 r7:ec90de60 r6:8587ce00 r5:857f6c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec915fb0 to 0xec915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85895b00 INFO: task kworker/0:956:5867 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 83546000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:957:5869 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:957 state:D stack:0 pid:5869 tgid:5869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec921d84 r8:00000002 r7:60000113 r6:ec921d8c r5:8593ec00 r4:8593ec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8593ec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec921e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881e80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8593ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb6f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b6b8c r4:858b6800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b6b8c r4:8587ce80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8593ec00 r8:8587ceac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587ce80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587ce80 r8:80287e08 r7:ec90de60 r6:85871e80 r5:8593ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec921fb0 to 0xec921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85895f40 INFO: task kworker/0:957:5869 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 83546000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:958:5872 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:958 state:D stack:0 pid:5872 tgid:5872 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec92dd84 r8:00000002 r7:60000113 r6:ec92dd8c r5:85940c00 r4:85940c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85940c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec92de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85964800 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85940c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc41000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858bc38c r4:858bc000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858bc38c r4:8587cf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85940c00 r8:8587cf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8587cf00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587cf00 r8:80287e08 r7:ec90de60 r6:85871f00 r5:85940c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec92dfb0 to 0xec92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85964080 INFO: task kworker/0:958:5872 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 8398f000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r5:85d27b8c r4:85d27800 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Call trace: r5:85941800 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8587cf80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8587cf80 r8:80287e08 r7:ec92de60 r6:85871f80 r5:85941800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec931fb0 to 0xec931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85964080 INFO: task kworker/0:959:5873 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 83bc2000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:960:5875 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:960 state:D stack:0 pid:5875 tgid:5875 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec939d84 r8:00000002 r7:60000013 r6:ec939d8c r5:85943000 r4:85943000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85943000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec939e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:858b778c r4:858b7400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec941e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85964580 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85942400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b7b8c r4:858b7800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858b7b8c r4:85965080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85942400 r8:859650ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85965080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85965080 r8:80287e08 r7:ec92de60 r6:8596b080 r5:85942400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec941fb0 to 0xec941ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:859642c0 INFO: task kworker/0:961:5877 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 840be000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0035fb0 to 0xe0035ff8) r4:8446a700 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:858b7f8c r4:85965100 r10:00000000 r9:85965100 r8:80287e08 r7:ec92de60 r6:8596b100 r5:85944800 task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85943c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec955e08 r5:858bd78c r4:858bd400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85965180 r8:80287e08 r7:ec92de60 r6:8596b180 r5:85943c00 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 84447000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:412:5885 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:412 state:D stack:0 pid:5885 tgid:5885 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec951d84 r8:00000002 r7:60000113 r6:ec951d8c r5:85946000 r4:85946000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85946000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec951e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858fc78c r4:858fc400 r7:ddde2d80 r6:83018200 r5:858fc78c r4:8596b200 r4:00000001 r4:859731c0 Workqueue: events bpf_prog_free_deferred 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) INFO: task kworker/0:964:5887 blocked for more than 475 seconds. r4:85946c00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85964ac0 r5:858bcb8c r4:858bc800 r7:dddced80 r6:83018000 r5:858bcb8c r4:85965200 r10:00000000 r9:85965200 r8:80287e08 r7:ec955e60 r6:8596b300 r5:85946c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec919fb0 to 0xec919ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85964a40 INFO: task kworker/0:964:5887 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 84afa000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:413:5888 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:413 state:D stack:0 pid:5888 tgid:5888 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85945400 r4:8291a680 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ec7b3000 r5:858fd78c r4:858fd400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8596b380 Exception stack(0xec959fb0 to 0xec959ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe0035d28 to 0xe0035d70) r4:82ac21e4 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85940000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 r5:858fcb8c r4:858fc800 r10:61c88647 r9:85940000 r8:8596b4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:415:5892 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:415 state:D stack:0 pid:5892 tgid:5892 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec91dd84 r8:00000002 r7:60000113 r6:ec91dd8c r5:85936c00 r4:85936c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85936c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec91de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85973600 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85936c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec55b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858fcf8c r4:858fcc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fcf8c r4:8596b580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85936c00 r8:8596b5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8596b580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8596b580 r8:80287e08 r7:ec959e60 r6:8596b600 r5:85936c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec91dfb0 to 0xec91dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85973400 INFO: task kworker/1:415:5892 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 853c0000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:416:5893 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec59f000 r5:858bcf8c r4:858bcc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:965:5895 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:965 state:D stack:0 pid:5895 tgid:5895 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec969d84 r8:00000002 r7:60000013 r6:ec969d8c r5:85948000 r4:85948000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85948000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec969e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85964b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85948000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5bd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858bd38c r4:858bd000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858bd38c r4:85965280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85948000 r8:859652ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85965280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85965280 r8:80287e08 r7:ec955e60 r6:8596b780 r5:85948000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec969fb0 to 0xec969ff8) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r4:85948c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec961e08 r5:00001000 r4:ec6a5000 r5:858c3b8c r4:858c3800 r7:ddde2d80 r6:83018200 r5:858c3b8c r4:8596b800 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:82ac21e4 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe0035fb0 to 0xe0035ff8) INFO: task kworker/0:966:5899 blocked for more than 475 seconds. r4:85949800 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec789e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589aa80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85949800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa79000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858bdb8c r4:858bd800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858bdb8c r4:85965300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85949800 r8:8596532c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85965300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85965300 r8:80287e08 r7:ec955e60 r6:8596b900 r5:85949800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec789fb0 to 0xec789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85964a00 INFO: task kworker/0:966:5899 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 860b3000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r5:8594b000 r4:8291a680 r4:00000000 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858be38c r4:858be000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858be38c r4:85965380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8594b000 r8:859653ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85965380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85965380 r8:80287e08 r7:ec789e60 r6:8596b980 r5:8594b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec881fb0 to 0xec881ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8589ab00 INFO: task kworker/0:967:5902 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 860b3000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:968:5903 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:968 state:D stack:0 pid:5903 tgid:5903 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec885d84 r8:00000002 r7:60000113 r6:ec885d8c r5:8594bc00 r4:8594bc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85964f80 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 Exception stack(0xe0035fb0 to 0xe0035ff8) INFO: task kworker/0:969:5906 blocked for more than 475 seconds. [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85961980 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858bfb8c r4:85965400 r10:00000000 r9:85965400 r8:80287e08 r7:ec881e60 r6:8596ba80 r5:8594d400 INFO: task kworker/0:969:5906 is blocked on a mutex likely owned by task kworker/0:121:3615. 5d20: 86645000 dfe3d000 00000001 80239b98 7f159000 00000001 r4:e0035dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:8594e000 r4:8291a680 r4:00000000 r4:00000000 r5:858be78c r4:858be400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85965500 r8:80287e08 r7:ec979e60 r6:8596bb00 r5:8594e000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85961000 INFO: task kworker/0:970:5907 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 86b26000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:971:5909 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:ec985d84 r8:00000002 r7:60000013 r6:ec985d8c r5:8594a400 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:858beb8c r4:858be800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8594a400 r8:859655ac r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 Call trace: 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:8291a684 r9:ec989d84 r8:00000002 r7:60000113 r6:ec989d8c r5:8594ec00 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:858bef8c r4:858bec00 r7:dddced80 r6:83018000 r5:858bef8c r4:85965600 r10:00000000 r9:85965600 r8:80287e08 r7:ec979e60 r6:8596bc00 r5:8594ec00 task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:973:5913 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:973 state:D stack:0 pid:5913 tgid:5913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec991d84 r8:00000002 r7:60000113 r6:ec991d8c r5:85988000 r4:85988000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85988000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec991e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85961700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85988000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6bf000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858bf38c r4:858bf000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858bf38c r4:85965680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85988000 r8:859656ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85965680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85965680 r8:80287e08 r7:ec979e60 r6:8596bc80 r5:85988000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec991fb0 to 0xec991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0035d28 to 0xe0035d70) r4:82ac21e4 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r4:85989800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec999e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:858bf78c r4:85965700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:975:5917 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:975 state:D stack:0 pid:5917 tgid:5917 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9a1d84 r8:00000002 r7:60000113 r6:ec9a1d8c r5:85988c00 r4:85988c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85988c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85961bc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85988c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb857000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c038c r4:858c0000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c038c r4:85965780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85988c00 r8:859657ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85965780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85965780 r8:80287e08 r7:ec979e60 r6:8596bd80 r5:85988c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9a1fb0 to 0xec9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:859616c0 Workqueue: events bpf_prog_free_deferred 5d20: 87739000 dfe3d000 00000001 80239b98 7f159000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r4:8598c800 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8598c800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 r5:858bff8c r4:858bfc00 r7:dddced80 r6:83018000 r5:858bff8c r4:85965800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:977:5922 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:977 state:D stack:0 pid:5922 tgid:5922 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9b5d84 r8:00000002 r7:60000013 r6:ec9b5d8c r5:8598bc00 r4:8598bc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8598bc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9b5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85961d00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8598bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8d1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c078c r4:858c0400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c078c r4:85965880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8598bc00 r8:859658ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85965880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85965880 r8:80287e08 r7:ec9a1e60 r6:8596be80 r5:8598bc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9b5fb0 to 0xec9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:00000000 5d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r5:85d27b8c r4:85d27800 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:8598a400 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 r7:dddced80 r6:83018000 r5:858c0f8c r4:85965900 r10:00000000 r9:85965900 r8:80287e08 r7:ec9b5e60 r6:8596bf00 r5:8598a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9b9fb0 to 0xec9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85961b80 INFO: task kworker/0:978:5924 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 87e02000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) INFO: task kworker/0:979:5926 blocked for more than 476 seconds. r5:8598d400 r4:8291a680 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85961f00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8598d400 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9ff000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c0b8c r4:858c0800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c0b8c r4:85965980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8598d400 r8:859659ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85965980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85965980 r8:80287e08 r7:ec9b9e60 r6:8596bf80 r5:8598d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9bdfb0 to 0xec9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85961d80 INFO: task kworker/0:979:5926 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 87f94000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe0035fb0 to 0xe0035ff8) task:kworker/0:980 state:D stack:0 pid:5928 tgid:5928 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r7:dddced80 r6:83018000 r5:858c138c r4:85965a00 r10:61c88647 r9:8598e000 r8:85965a2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe0035fb0 to 0xe0035ff8) r4:8446a700 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8598ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5ed000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c1b8c r4:858c1800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c1b8c r4:85965a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8598ec00 r8:85965aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85965a80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85965a80 r8:80287e08 r7:ec9c1e60 r6:85982080 r5:8598ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9c5fb0 to 0xec9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85961fc0 INFO: task kworker/0:981:5930 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 88353000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:982:5931 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85849800 r4:8291a680 r4:00000000 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:858c178c r4:85965b00 Exception stack(0xec981fb0 to 0xec981ff8) INFO: task kworker/0:982:5931 is blocked on a mutex likely owned by task kworker/0:121:3615. 5d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8584bc00 r4:8291a680 r4:00000000 r4:00000000 r5:00001000 r4:ec605000 r7:dddced80 r6:83018000 r5:858c1f8c r4:85965c00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:82ac21e4 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:984:5937 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:984 state:D stack:0 pid:5937 tgid:5937 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9d1d84 r8:00000002 r7:60000113 r6:ec9d1d8c r5:85990000 r4:85990000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85990000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9d1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597f480 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85990000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec615000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c238c r4:858c2000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c238c r4:85965d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85990000 r8:85965d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85965d00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85965d00 r8:80287e08 r7:ec84de60 r6:85982100 r5:85990000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9d1fb0 to 0xec9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8597f3c0 INFO: task kworker/0:984:5937 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 888eb000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:8291a684 r9:ec9d5d84 r8:00000002 r7:60000113 r6:ec9d5d8c r5:85990c00 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:986:5940 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:986 state:D stack:0 pid:5940 tgid:5940 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9d9d84 r8:00000002 r7:60000013 r6:ec9d9d8c r5:85992400 r4:85992400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85992400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9d9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597f7c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85992400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec649000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c2b8c r4:858c2800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c2b8c r4:85965e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85992400 r8:85965e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85965e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85965e00 r8:80287e08 r7:ec9d5e60 r6:85982200 r5:85992400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9d9fb0 to 0xec9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8597f580 INFO: task kworker/0:986:5940 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:00000000 5d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) r4:8446a700 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8584a400 r4:8291a680 r4:00000000 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9b1fb0 to 0xec9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8597f6c0 INFO: task kworker/0:988:5944 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 89760000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:989:5946 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:989 state:D stack:0 pid:5946 tgid:5946 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9c9d84 r8:00000002 r7:60000113 r6:ec9c9d8c r5:8584d400 r4:8584d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8584d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9c9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597ffc0 r5:858c3f8c r4:858c3c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85987000 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 5d20: 899a0000 dfe3d000 00000001 80239b98 7f159000 00000001 r4:e0035dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:8584ec00 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8584ec00 r8:8598712c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85987100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85987100 r8:80287e08 r7:ec9c9e60 r6:85987180 r5:8584ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9f1fb0 to 0xec9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8597fe40 INFO: task kworker/0:990:5950 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 89db1000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:418:5951 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:418 state:D stack:0 pid:5951 tgid:5951 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9f5d84 r8:00000002 r7:60000113 r6:ec9f5d8c r5:8584e000 r4:8584e000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8584e000 r4:8291a680 r4:00000000 r4:00000000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85982300 r8:80287e08 r7:ec959e60 r6:85987200 r5:8584e000 r4:85979f80 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:991:5953 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:991 state:D stack:0 pid:5953 tgid:5953 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85848000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85848000 r8:859872ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:992:5954 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:992 state:D stack:0 pid:5954 tgid:5954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9fdd84 r8:00000002 r7:60000013 r6:ec9fdd8c r5:8584c800 r4:8584c800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8584c800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9fde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85984540 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8584c800 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec795000 r5:858c4b8c r4:858c4800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85987380 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 5d20: 8a303000 dfe3d000 00000001 80239b98 7f159000 00000001 r4:e0035dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 INFO: task kworker/0:993:5957 blocked for more than 476 seconds. r4:84718000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca05e08 r9:83018005 r8:84718000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85987480 r8:80287e08 r7:ec9fde60 r6:85987500 r5:84718000 r4:859843c0 Workqueue: events bpf_prog_free_deferred 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:419:5960 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:419 state:D stack:0 pid:5960 tgid:5960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca09d84 r8:00000002 r7:60000113 r6:eca09d8c r5:84719800 r4:84719800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84719800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca09e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e2640 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84719800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8442f38c r4:8442f000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8442f38c r4:85982380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84719800 r8:859823ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85982380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85982380 r8:80287e08 r7:ec959e60 r6:85987580 r5:84719800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca09fb0 to 0xeca09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85979340 INFO: task kworker/1:419:5960 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 5d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r5:85d27b8c r4:85d27800 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:8446a700 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca11d84 r8:00000002 r7:60000113 r6:eca11d8c r5:8471b000 r4:8471b000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8471b000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca11e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85983680 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8471b000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5a1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858fdf8c r4:858fdc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fdf8c r4:85982400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8471b000 r8:8598242c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85982400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85982400 r8:80287e08 r7:eca09e60 r6:85987600 r5:8471b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca11fb0 to 0xeca11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85979340 INFO: task kworker/1:420:5962 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:994:5963 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:994 state:D stack:0 pid:5963 tgid:5963 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca15d84 r8:00000002 r7:60000113 r6:eca15d8c r5:8471bc00 r4:8471bc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8471bc00 r4:8291a680 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8471bc00 r8:859876ac r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:ed769000 r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca19e08 r9:83018005 r8:8471c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85987780 r8:80287e08 r7:eca15e60 r6:85987800 r5:8471c800 Workqueue: events bpf_prog_free_deferred 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 r4:00000000 r5:00001000 r4:ed769000 r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:996:5967 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:996 state:D stack:0 pid:5967 tgid:5967 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9e9d84 r8:00000002 r7:60000113 r6:ec9e9d8c r5:85994800 r4:85994800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85994800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9e9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85984fc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85994800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec843000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c5f8c r4:858c5c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5f8c r4:85987880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85994800 r8:859878ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85987880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85987880 r8:80287e08 r7:eca19e60 r6:85982480 r5:85994800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9e9fb0 to 0xec9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85984bc0 INFO: task kworker/0:996:5967 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 8b2d8000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xe0035d28 to 0xe0035d70) 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:998:5971 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:998 state:D stack:0 pid:5971 tgid:5971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca21d84 r8:00000002 r7:60000113 r6:eca21d8c r5:85996000 r4:85996000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85996000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca21e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859841c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85996000 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec85b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c638c r4:858c6000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c638c r4:85987980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85996000 r8:859879ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85987980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85987980 r8:80287e08 r7:ec9e9e60 r6:85982580 r5:85996000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca21fb0 to 0xeca21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 r4:e0035dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) INFO: task kworker/0:999:5973 blocked for more than 476 seconds. r4:85991800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8cde08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaef000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c678c r4:858c6400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c678c r4:85987a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85991800 r8:85987a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85987a00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85987a00 r8:80287e08 r7:eca21e60 r6:85982600 r5:85991800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8cdfb0 to 0xec8cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85984140 INFO: task kworker/0:999:5973 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 8b8f7000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe0035fb0 to 0xe0035ff8) INFO: task kworker/0:1000:5975 blocked for more than 476 seconds. r4:85996c00 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8f5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c02c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85996c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead91000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c6f8c r4:858c6c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c6f8c r4:85987a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85996c00 r8:85987aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85987a80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85987a80 r8:80287e08 r7:ec8cde60 r6:85982680 r5:85996c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8f5fb0 to 0xec8f5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r5:80070013 r4:80239bb0 r4:00000000 r5:00001000 r4:ed769000 r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:8291a684 r9:eca0dd84 r8:00000002 r7:60000113 r6:eca0dd8c r5:8471a400 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e00c5000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85987b00 r8:80287e08 r7:ec8f5e60 r6:85987b80 r5:8471a400 r4:8597f840 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r5:80070013 r4:80239bb0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0035fb0 to 0xe0035ff8) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:ec8e5d84 r8:00000002 r7:60000013 r6:ec8e5d8c r5:8471d400 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:858c778c r4:85987c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8471d400 r8:85987c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85987c00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85987c00 r8:80287e08 r7:ec8f5e60 r6:85987c80 r5:8471d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8e5fb0 to 0xec8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:859c0140 INFO: task kworker/0:1002:5979 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 8bd38000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1003:5981 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1003 state:D stack:0 pid:5981 tgid:5981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8471e000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 r7:dddced80 r6:83018000 r5:858c738c r4:85987d00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:00000000 r5:80070013 r4:80239bb0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c7b8c r4:85987e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8471ec00 r8:85987e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85987e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85987e00 r8:80287e08 r7:ec8e5e60 r6:85987e80 r5:8471ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca1dfb0 to 0xeca1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:859c0240 INFO: task kworker/0:1004:5982 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 8c914000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1005:5986 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1005 state:D stack:0 pid:5986 tgid:5986 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84718c00 r4:8291a680 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:858d438c r4:85987f00 r4:85987f00 Exception stack(0xeca31fb0 to 0xeca31ff8) r4:859c0700 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) r4:8446a700 task:kworker/1:421 state:D stack:0 pid:5988 tgid:5988 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:858fe38c r4:858fe000 r7:ddde2d80 r6:83018200 r5:858fe38c r4:85982700 r10:00000000 r9:85982700 r8:80287e08 r7:eca09e60 r6:85981000 r5:8584b000 r4:85983480 Call trace: 5d20: 8c914000 dfe3d000 00000001 80239b98 7f159000 00000001 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:422:5989 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:422 state:D stack:0 pid:5989 tgid:5989 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca41d84 r8:00000002 r7:60000113 r6:eca41d8c r5:85858c00 r4:85858c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85858c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca41e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85983900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85858c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb67000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858fe78c r4:858fe400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fe78c r4:85982780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85858c00 r8:859827ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85982780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85982780 r8:80287e08 r7:eca09e60 r6:85981080 r5:85858c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca41fb0 to 0xeca41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) r4:8446a700 task:kworker/0:1006 state:D stack:0 pid:5991 tgid:5991 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca3de08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:858c7f8c r4:85981100 r10:00000000 r9:85981100 r8:80287e08 r7:eca31e60 r6:85981180 r5:85859800 r4:859c0ac0 Call trace: 5d20: 8ce68000 dfe3d000 00000001 80239b98 7f159000 00000001 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1007:5994 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1007 state:D stack:0 pid:5994 tgid:5994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca49d84 r8:00000002 r7:60000013 r6:eca49d8c r5:8585a400 r4:8585a400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8585a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca49e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85984280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8585a400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb3d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858d478c r4:858d4400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858d478c r4:85981200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8585a400 r8:8598122c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85981200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85981200 r8:80287e08 r7:eca31e60 r6:85981280 r5:8585a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca49fb0 to 0xeca49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:859c0d00 INFO: task kworker/0:1007:5994 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 r4:00000000 r5:85d27b8c r4:85d27800 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca4dd84 r8:00000002 r7:60000113 r6:eca4dd8c r5:85858000 r4:85858000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85858000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca4de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85980180 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85858000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb93000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858d4b8c r4:858d4800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858d4b8c r4:85981300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85858000 r8:8598132c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85981300 r10:00000000 r9:85981300 r8:80287e08 r7:eca49e60 r6:85981380 r5:85858000 r4:859c0dc0 Call trace: 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8446a700 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:8585b000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 r7:ddde2d80 r6:83018200 r5:858d538c r4:85982800 r10:00000000 r9:85982800 r8:80287e08 r7:eca09e60 r6:85981400 r5:8585b000 r4:85983780 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1009:6000 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1009 state:D stack:0 pid:6000 tgid:6000 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca59d84 r8:00000002 r7:60000013 r6:eca59d8c r5:8585bc00 r4:8585bc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8585bc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca59e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85980440 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8585bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbaf000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858d4f8c r4:858d4c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858d4f8c r4:85981480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8585bc00 r8:859814ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85981480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85981480 r8:80287e08 r7:eca4de60 r6:85981500 r5:8585bc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca59fb0 to 0xeca59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85980140 INFO: task kworker/0:1009:6000 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 8d8fe000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:8585c800 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1011:6004 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1011 state:D stack:0 pid:6004 tgid:6004 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca61d84 r8:00000002 r7:60000013 r6:eca61d8c r5:8585d400 r4:8585d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8585d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca61e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85983a40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8585d400 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858feb8c r4:858fe800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858feb8c r4:85981680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8585d400 r8:859816ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85981680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85981680 r8:80287e08 r7:eca5de60 r6:85981700 r5:8585d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca61fb0 to 0xeca61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:859804c0 INFO: task kworker/0:1011:6004 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) INFO: task kworker/1:424:6006 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca69d84 r8:00000002 r7:60000113 r6:eca69d8c r5:85848c00 r4:85848c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85848c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca69e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e2d40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85848c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf5f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858ff78c r4:858ff400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858ff78c r4:85982880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85848c00 r8:859828ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85982880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85982880 r8:80287e08 r7:eca09e60 r6:85981780 r5:85848c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca69fb0 to 0xeca69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8585e000 r4:8291a680 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8585e000 r8:8598182c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca65e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85980d40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8585ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec52d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858d5f8c r4:858d5c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858d5f8c r4:85981900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8585ec00 r8:8598192c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85981900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85981900 r8:80287e08 r7:eca5de60 r6:85981980 r5:8585ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca65fb0 to 0xeca65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85980a40 INFO: task kworker/0:1013:6011 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 8e600000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc5-syzkaller #0 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858d638c r4:85981a00 r4:85981a00 Exception stack(0xeca2dfb0 to 0xeca2dff8) task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1015:6015 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1015 state:D stack:0 pid:6015 tgid:6015 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca71d84 r8:00000002 r7:60000113 r6:eca71d8c r5:85a08c00 r4:85a08c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a08c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca71e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85980600 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85a08c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec55d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858d678c r4:858d6400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858d678c r4:85981b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a08c00 r8:85981b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85981b00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85981b00 r8:80287e08 r7:eca2de60 r6:85981b80 r5:85a08c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca71fb0 to 0xeca71ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:85980d80 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:82ac21e4 r4:00000000 r5:85d27b8c r4:85d27800 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1016:6016 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1016 state:D stack:0 pid:6016 tgid:6016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca29d84 r8:00000002 r7:60000113 r6:eca29d8c r5:85a09800 r4:85a09800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a09800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca29e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597c040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85a09800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858d6b8c r4:858d6800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85981c00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:00000000 5d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1018:6021 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1018 state:D stack:0 pid:6021 tgid:6021 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca81d84 r8:00000002 r7:60000113 r6:eca81d8c r5:85a0b000 r4:85a0b000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a0b000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca81e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597c440 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85a0b000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7e3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858d738c r4:858d7000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858d738c r4:85981e00 r4:85981e00 r4:8597c100 r4:00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85a0bc00 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:858d7b8c r4:858d7800 r4:00000001 task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85a0c800 r4:8291a680 r4:00000000 r5:858d778c r4:858d7400 r10:61c88647 r9:85a0c800 r8:859cb02c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:1021:6026 blocked for more than 477 seconds. r5:85a0d400 r4:8291a680 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:85a4038c r4:85a40000 r10:00000000 r9:859cb100 r8:80287e08 r7:eca85e60 r6:859cb180 r5:85a0d400 Workqueue: events bpf_prog_free_deferred 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) INFO: task kworker/0:1022:6028 blocked for more than 477 seconds. r4:85a0e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca8de08 r9:83018005 r8:85a0e000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 r5:858d7f8c r4:858d7c00 r4:859cb200 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 8fe15000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1023:6030 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 Call trace: [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85a4078c r4:85a40400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85a0ec00 r8:859cb32c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0035d28 to 0xe0035d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r5:85d27b8c r4:85d27800 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:84bb0c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecab9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e2ec0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84bb0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1b5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858ffb8c r4:858ff800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858ffb8c r4:85982980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bb0c00 r8:859829ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85982980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85982980 r8:80287e08 r7:eca09e60 r6:85982a00 r5:84bb0c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecab9fb0 to 0xecab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:859e2bc0 INFO: task kworker/1:425:6083 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 90496000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:00001000 r4:ed769000 r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84bb1800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 r5:858fff8c r4:858ffc00 r10:61c88647 r9:84bb1800 r8:85982aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8442ef8c r4:8442ec00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85982b80 r8:80287e08 r7:eca09e60 r6:85982c00 r5:84bb2400 task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 9094f000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:428:6090 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:428 state:D stack:0 pid:6090 tgid:6090 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb2dd84 r8:00000002 r7:60000113 r6:ecb2dd8c r5:84bb3000 r4:84bb3000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bb3000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb2de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83d5d740 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84bb3000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8442eb8c r4:8442e800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8442eb8c r4:85982c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bb3000 r8:85982cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85982c80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85982c80 r8:80287e08 r7:ecb25e60 r6:859cb580 r5:84bb3000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb2dfb0 to 0xecb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:859e2700 INFO: task kworker/1:428:6090 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 9094f000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 r5:85d27b8c r4:85d27800 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:ecb09d84 r8:00000002 r7:60000113 r6:ecb09d8c r5:85a13c00 r4:00000000 r4:00000000 r5:8442e78c r4:8442e400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:8291a684 r9:ecb21d84 r8:00000002 r7:60000113 r6:ecb21d8c r5:85a13000 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ec040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85a13000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5ed000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847a838c r4:847a8000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847a838c r4:85982d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a13000 r8:85982dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85982d80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85982d80 r8:80287e08 r7:ecb09e60 r6:859cb680 r5:85a13000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb21fb0 to 0xecb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:859ec080 INFO: task kworker/1:430:6094 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 90fd8000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0035fb0 to 0xe0035ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85a14800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb31e08 r5:00001000 r4:eb687000 r5:847a878c r4:847a8400 r10:61c88647 r9:85a14800 r8:85982e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0035d28 to 0xe0035d70) [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:ed769000 r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85a15400 r4:8291a680 r4:00000000 r4:00000000 r5:847a9b8c r4:847a9800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85982e80 Exception stack(0xecb35fb0 to 0xecb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:859ec200 INFO: task kworker/1:432:6097 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 910e0000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:433:6100 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:433 state:D stack:0 pid:6100 tgid:6100 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb39d84 r8:00000002 r7:60000113 r6:ecb39d8c r5:85a16000 r4:85a16000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a16000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb39e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ec4c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85a16000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:847a8b8c r4:847a8800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85982f00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:434:6101 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:434 state:D stack:0 pid:6101 tgid:6101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb3dd84 r8:00000002 r7:60000113 r6:ecb3dd8c r5:85a16c00 r4:85a16c00 r5:85a16c00 r4:8291a680 r4:00000000 r4:00000000 r5:847a938c r4:847a9000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Call trace: 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 r4:e0035dc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:435:6105 blocked for more than 477 seconds. r5:85a12400 r4:8291a680 r4:00000000 r4:00000000 r5:847a978c r4:847a9400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 r4:e0035dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:8446a700 task:kworker/1:436 state:D stack:0 pid:6107 tgid:6107 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb4de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ecc00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85a18000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaaf000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847aa38c r4:847aa000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847aa38c r4:859e8080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a18000 r8:859e80ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859e8080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e8080 r8:80287e08 r7:ecb35e60 r6:859cb980 r5:85a18000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb4dfb0 to 0xecb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:859ec6c0 INFO: task kworker/1:436:6107 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 91b2f000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 r5:85d27b8c r4:85d27800 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:8446a700 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85a18c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r5:847a9f8c r4:847a9c00 r10:61c88647 r9:85a18c00 r8:859e812c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:82ac21e4 r4:e0035dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:8291a684 r9:ecb59d84 r8:00000002 r7:60000113 r6:ecb59d8c r5:85a1a400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d6040 r5:847ab78c r4:847ab400 r10:61c88647 r9:85a1a400 r8:859e81ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 92082000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:439:6112 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:439 state:D stack:0 pid:6112 tgid:6112 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb61d84 r8:00000002 r7:60000113 r6:ecb61d8c r5:85a1bc00 r4:85a1bc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a1bc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb61e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ecd80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85a1bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb47000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847aa78c r4:847aa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847aa78c r4:859e8200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a1bc00 r8:859e822c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859e8200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e8200 r8:80287e08 r7:ecb59e60 r6:859cbb00 r5:85a1bc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb61fb0 to 0xecb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:859eca80 INFO: task kworker/1:439:6112 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 92082000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:8291a684 r9:ecb69d84 r8:00000002 r7:60000113 r6:ecb69d8c r5:85a1b000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:847aab8c r4:847aa800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0035d28 to 0xe0035d70) 5d60: 80230ad0 80239bb0 80070013 ffffffff [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 r5:00001000 r4:ed769000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:847aaf8c r4:847aac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:859e8380 r8:80287e08 r7:ecb59e60 r6:859cbc00 r5:85a1d400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:859ecc80 INFO: task kworker/1:441:6116 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 9299c000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:442:6118 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:442 state:D stack:0 pid:6118 tgid:6118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb75d84 r8:00000002 r7:60000013 r6:ecb75d8c r5:85a1c800 r4:85a1c800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a1c800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb75e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e2080 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85a1c800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbe5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847ab38c r4:847ab000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847ab38c r4:859e8300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a1c800 r8:859e832c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859e8300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e8300 r8:80287e08 r7:ecb59e60 r6:859cbc80 r5:85a1c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85a1e000 r4:8291a680 r4:00000000 r4:00000000 r5:847abb8c r4:847ab800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85a1e000 r8:859e842c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:82ac21e4 r4:00000000 r5:85d27b8c r4:85d27800 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85a1ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb19e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d6640 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85a1ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5c7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e038c r4:847e0000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847e038c r4:859e8480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a1ec00 r8:859e84ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859e8480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e8480 r8:80287e08 r7:ecb79e60 r6:859cbd80 r5:85a1ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb19fb0 to 0xecb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:859d6100 INFO: task kworker/1:444:6122 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 931a4000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec58f000 r5:847abf8c r4:847abc00 r10:61c88647 r9:85a19800 r8:859e852c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xe0035d28 to 0xe0035d70) [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:85d27b8c r4:85d27800 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:850e8000 r4:8291a680 r4:00000000 r4:00000000 r5:847e0b8c r4:847e0800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 935e1000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:447:6131 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:447 state:D stack:0 pid:6131 tgid:6131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb89d84 r8:00000002 r7:60000113 r6:ecb89d8c r5:850e8c00 r4:850e8c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850e8c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb89e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d6740 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:850e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5e5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:847e078c r4:847e0400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:859e8600 r8:80287e08 r7:ecb85e60 r6:859cbf00 r5:850e8c00 task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:8446a700 task:kworker/1:448 state:D stack:0 pid:6133 tgid:6133 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d6c80 r5:847e178c r4:847e1400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:449:6134 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:449 state:D stack:0 pid:6134 tgid:6134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb95d84 r8:00000002 r7:60000113 r6:ecb95d8c r5:850eb000 r4:850eb000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850eb000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb95e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d6a40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:850eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec63f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e0f8c r4:847e0c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847e0f8c r4:859e8700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:859e8700 r8:80287e08 r7:ecb91e60 r6:859c6000 r5:850eb000 task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:850ec800 r5:850ec800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb9de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d6b80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:850ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec667000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e138c r4:847e1000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847e138c r4:859e8780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850ec800 r8:859e87ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859e8780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e8780 r8:80287e08 r7:ecb91e60 r6:859c6080 r5:850ec800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb9dfb0 to 0xecb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:859d68c0 task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:850ed400 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecba5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d6f80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:850ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec77d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e1f8c r4:847e1c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847e1f8c r4:859e8800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850ed400 r8:859e882c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859e8800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e8800 r8:80287e08 r7:ecb91e60 r6:859c6100 r5:850ed400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecba5fb0 to 0xecba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:859d6a00 INFO: task kworker/1:451:6138 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 93f9a000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:85d27b8c r4:85d27800 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Call trace: r5:850e9800 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:859d6a80 INFO: task kworker/1:452:6140 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 943a0000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84bb5400 r4:00000000 r4:00000000 r5:847e278c r4:847e2400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84bb5400 r8:859e892c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:85d27b8c r4:85d27800 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84bb6c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecadde08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:847e238c r4:859e8a00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:455:6147 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:455 state:D stack:0 pid:6147 tgid:6147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb7dd84 r8:00000002 r7:60000113 r6:ecb7dd8c r5:84bb6000 r4:84bb6000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bb6000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb7de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f7dc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84bb6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec837000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e2b8c r4:847e2800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847e2b8c r4:859e8b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bb6000 r8:859e8b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859e8b00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e8b00 r8:80287e08 r7:ecba9e60 r6:859e8b80 r5:84bb6000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:850ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 r5:847e2f8c r4:847e2c00 r4:859e8c00 dfa0: 00000000 00000000 00000000 00000000 Call trace: 5d20: 94c0e000 dfe3d000 00000001 80239b98 7f159000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:457:6152 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:457 state:D stack:0 pid:6152 tgid:6152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbc5d84 r8:00000002 r7:60000013 r6:ecbc5d8c r5:85a10c00 r4:85a10c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a10c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbc5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85978300 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85a10c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec879000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e338c r4:847e3000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847e338c r4:859e8c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a10c00 r8:859e8cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859e8c80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e8c80 r8:80287e08 r7:ecbbde60 r6:859c6280 r5:85a10c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbc5fb0 to 0xecbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85978040 INFO: task kworker/1:457:6152 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 950d0000 dfe3d000 00000001 80239b98 7f159000 00000001 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r5:850ee000 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 5d20: 950d0000 dfe3d000 00000001 80239b98 7f159000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r5:00001000 r4:ed769000 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:459:6156 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:459 state:D stack:0 pid:6156 tgid:6156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbd5d84 r8:00000002 r7:60000013 r6:ecbd5d8c r5:85a20000 r4:85a20000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a20000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbd5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85978c00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85a20000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8c5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a74f8c r4:85a74c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a74f8c r4:859e8d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a20000 r8:859e8dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859e8d80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e8d80 r8:80287e08 r7:ecbcde60 r6:859c6380 r5:85a20000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbd5fb0 to 0xecbd5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 80230ad0 80239bb0 80070013 ffffffff [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:460:6157 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:460 state:D stack:0 pid:6157 tgid:6157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbd9d84 r8:00000002 r7:60000113 r6:ecbd9d8c r5:85a20c00 r4:85a20c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a20c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbd9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e3b8c r4:847e3800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85a20c00 r8:859e8e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85978440 Workqueue: events bpf_prog_free_deferred [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 r5:00001000 r4:ed769000 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 5fa0: 00000000 00000000 00000000 00000000 r4:8446a700 Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:461 state:D stack:0 pid:6159 tgid:6159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbe1d84 r8:00000002 r7:60000113 r6:ecbe1d8c r5:85a22400 r4:85a22400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a22400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbe1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85978700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85a22400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac7f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847e3f8c r4:847e3c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847e3f8c r4:859e8e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a22400 r8:859e8eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859e8e80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e8e80 r8:80287e08 r7:ecbd5e60 r6:859c6480 r5:85a22400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbe1fb0 to 0xecbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85978380 INFO: task kworker/1:461:6159 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 9598c000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:462:6161 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:462 state:D stack:0 pid:6161 tgid:6161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7438c r4:85a74000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7438c r4:859e8f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a21800 r8:859e8f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859e8f00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e8f00 r8:80287e08 r7:ecbd5e60 r6:859c6500 r5:85a21800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbe9fb0 to 0xecbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85978500 INFO: task kworker/1:462:6161 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 95cd4000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:463:6163 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:463 state:D stack:0 pid:6163 tgid:6163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbf1d84 r8:00000002 r7:60000113 r6:ecbf1d8c r5:85a23000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:00001000 r4:eb3d1000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7478c r4:85a74400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a23000 r8:859e8fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859e8f80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e8f80 r8:80287e08 r7:ecbd5e60 r6:859c6580 r5:85a23000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf1fb0 to 0xecbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:859787c0 INFO: task kworker/1:463:6163 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 95cd4000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:464:6165 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:464 state:D stack:0 pid:6165 tgid:6165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbf9d84 r8:00000002 r7:60000113 r6:ecbf9d8c r5:85a25400 r4:85a25400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a25400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85978a80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85a25400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb917000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a74b8c r4:85a74800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a74b8c r4:85963000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a25400 r8:8596302c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85963000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85963000 r8:80287e08 r7:ecbd5e60 r6:859c6600 r5:85a25400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf9fb0 to 0xecbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85978780 INFO: task kworker/1:464:6165 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 96047000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:465:6168 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:465 state:D stack:0 pid:6168 tgid:6168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbfdd84 r8:00000002 r7:60000013 r6:ecbfdd8c r5:85a23c00 r4:85a23c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a23c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbfde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85978d40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85a23c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7538c r4:85a75000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7538c r4:85963080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a23c00 r8:859630ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85963080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85963080 r8:80287e08 r7:ecbd5e60 r6:859c6680 r5:85a23c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbfdfb0 to 0xecbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85978a00 INFO: task kworker/1:465:6168 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 96047000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:466:6170 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:466 state:D stack:0 pid:6170 tgid:6170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc01d84 r8:00000002 r7:60000013 r6:ecc01d8c r5:85a26000 r4:85a26000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a26000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc01e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85978c80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85a26000 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec94d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a75b8c r4:85a75800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a75b8c r4:85963100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a26000 r8:8596312c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85963100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85963100 r8:80287e08 r7:ecbfde60 r6:859c6700 r5:85a26000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc01fb0 to 0xecc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85978bc0 INFO: task kworker/1:466:6170 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 9656c000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 Exception stack(0xe0035fb0 to 0xe0035ff8) r4:8446a700 task:kworker/1:467 state:D stack:0 pid:6171 tgid:6171 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85978f00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85a26c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec935000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7578c r4:85a75400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7578c r4:85963180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a26c00 r8:859631ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85963180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85963180 r8:80287e08 r7:ecc01e60 r6:859c6780 r5:85a26c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc05fb0 to 0xecc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85978900 INFO: task kworker/1:467:6171 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 96896000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:468:6174 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:468 state:D stack:0 pid:6174 tgid:6174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbb1d84 r8:00000002 r7:60000013 r6:ecbb1d8c r5:85a24800 r4:85a24800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a24800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbb1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595d040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85a24800 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec993000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a75f8c r4:85a75c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a75f8c r4:85963200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a24800 r8:8596322c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85963200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85963200 r8:80287e08 r7:ecc01e60 r6:859c6800 r5:85a24800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbb1fb0 to 0xecbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85978900 INFO: task kworker/1:468:6174 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 96896000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8446a700 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc09d84 r8:00000002 r7:60000113 r6:ecc09d8c r5:85a11800 r4:85a11800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a11800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc09e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595d380 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85a11800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9a9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7638c r4:85a76000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7638c r4:85963280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a11800 r8:859632ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85963280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85963280 r8:80287e08 r7:ecbb1e60 r6:859c6880 r5:85a11800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc09fb0 to 0xecc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8595d100 INFO: task kworker/1:469:6177 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 96ac3000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:470:6178 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:470 state:D stack:0 pid:6178 tgid:6178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a76f8c r4:85a76c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r5:80070013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r5:00001000 r4:ed769000 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:85a28000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc11e08 r5:00001000 r4:eca01000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85a28000 r8:859633ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8595d200 INFO: task kworker/1:471:6180 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 97040000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:472:6182 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:472 state:D stack:0 pid:6182 tgid:6182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbf5d84 r8:00000002 r7:60000113 r6:ecbf5d8c r5:85a28c00 r4:85a28c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a28c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595d640 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85a28c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e7000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca51000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a76b8c r4:85a76800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d20: 97abd000 dfe3d000 00000001 80239b98 7f159000 00000001 r4:e0035dc0 r5:00001000 r4:ed769000 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:474:6188 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:474 state:D stack:0 pid:6188 tgid:6188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc25d84 r8:00000002 r7:60000113 r6:ecc25d8c r5:85a2a400 r4:85a2a400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a2a400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc25e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595d840 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85a2a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0eb000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecadf000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7738c r4:85a77000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7738c r4:85963500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a2a400 r8:8596352c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85963500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85963500 r8:80287e08 r7:ecc1de60 r6:859c6b00 r5:85a2a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc25fb0 to 0xecc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8595d6c0 INFO: task kworker/1:474:6188 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:475:6189 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:475 state:D stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc29d84 r8:00000002 r7:60000113 r6:ecc29d8c r5:85a2bc00 r4:85a2bc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a2bc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc29e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595df40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85a2bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb37000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847d478c r4:847d4400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847d478c r4:85963580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a2bc00 r8:859635ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85963580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85963580 r8:80287e08 r7:ecc1de60 r6:859c6b80 r5:85a2bc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc29fb0 to 0xecc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8595d580 INFO: task kworker/1:475:6189 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0035d28 to 0xe0035d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r5:00001000 r4:ed769000 r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595dcc0 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a77f8c r4:85a77c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a77f8c r4:85963600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a29800 r8:8596362c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85963600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85963600 r8:80287e08 r7:ecc29e60 r6:859c6c00 r5:85a29800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc31fb0 to 0xecc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8595da80 INFO: task kworker/1:476:6191 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 97ad0000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r5:00001000 r4:ed769000 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 Workqueue: events bpf_prog_free_deferred r4:00000000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 Not tainted 6.15.0-rc5-syzkaller #0 r5:85a2c800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc41e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595d9c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85a2c800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabaf000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847d4b8c r4:847d4800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847d4b8c r4:85963700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a2c800 r8:8596372c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85963700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85963700 r8:80287e08 r7:ecc29e60 r6:859c6d00 r5:85a2c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc41fb0 to 0xecc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8595dc80 INFO: task kworker/1:478:6196 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:00001000 r4:ed769000 r4:00000001 r4:8446a700 r4:85a2e000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8595ddc0 Exception stack(0xe0035d28 to 0xe0035d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:480:6200 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:480 state:D stack:0 pid:6200 tgid:6200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc4dd84 r8:00000002 r7:60000113 r6:ecc4dd8c r5:84ab8c00 r4:84ab8c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ab8c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc4de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595d400 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ab8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb543000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847d4f8c r4:847d4c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847d4f8c r4:85963800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ab8c00 r8:8596382c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85963800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85963800 r8:80287e08 r7:ecc45e60 r6:859c6e00 r5:84ab8c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc4dfb0 to 0xecc4dff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Call trace: Exception stack(0xe0035d28 to 0xe0035d70) 5d60: 80230ad0 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r5:00001000 r4:ed769000 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:481:6202 blocked for more than 477 seconds. r10:8291a684 r9:ecc55d84 r8:00000002 r7:60000113 r6:ecc55d8c r5:84ab8000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ab8000 r8:859638ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85963880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85963880 r8:80287e08 r7:ecc45e60 r6:859c6e80 r5:84ab8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc55fb0 to 0xecc55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8595d900 INFO: task kworker/1:481:6202 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 98bb5000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:482:6204 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:482 state:D stack:0 pid:6204 tgid:6204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc5dd84 r8:00000002 r7:60000013 r6:ecc5dd8c r5:84ab9800 r4:84ab9800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ab9800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc5de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589b300 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ab9800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847d5b8c r4:847d5800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847d5b8c r4:85963900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ab9800 r8:8596392c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85963900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85963900 r8:80287e08 r7:ecc45e60 r6:859c6f00 r5:84ab9800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc5dfb0 to 0xecc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85978f80 INFO: task kworker/1:482:6204 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 98bb5000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:8446a700 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589b440 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84abb000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb96b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847d5f8c r4:847d5c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847d5f8c r4:85963980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84abb000 r8:859639ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85963980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85963980 r8:80287e08 r7:ecc5de60 r6:859c6f80 r5:84abb000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc61fb0 to 0xecc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8589b180 INFO: task kworker/1:483:6207 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:484:6208 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:484 state:D stack:0 pid:6208 tgid:6208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc65d84 r8:00000002 r7:60000113 r6:ecc65d8c r5:84abbc00 r4:84abbc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84abbc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc65e08 r4:00000000 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847d638c r4:847d6000 r7:ddde2d80 r6:83018200 r5:847d638c r4:85963a00 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebb3b000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85963a80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d20: 9927d000 dfe3d000 00000001 80239b98 7f159000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:486:6213 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:486 state:D stack:0 pid:6213 tgid:6213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc59d84 r8:00000002 r7:60000013 r6:ecc59d8c r5:84abd400 r4:84abd400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84abd400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc59e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589b800 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84abd400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb7f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847d6b8c r4:847d6800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847d6b8c r4:85963b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84abd400 r8:85963b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85963b00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85963b00 r8:80287e08 r7:ecc69e60 r6:85894100 r5:84abd400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc59fb0 to 0xecc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8589b380 INFO: task kworker/1:486:6213 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 9927d000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) INFO: task kworker/1:487:6216 blocked for more than 478 seconds. r10:8291a684 r9:ecc75d84 r8:00000002 r7:60000113 r6:ecc75d8c r5:84abe000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:00000000 5d60: 80230ad0 80239bb0 80070013 ffffffff r4:e0035dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:488:6218 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:488 state:D stack:0 pid:6218 tgid:6218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc15d84 r8:00000002 r7:60000013 r6:ecc15d8c r5:84bb3c00 r4:84bb3c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bb3c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc15e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589bb40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84bb3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc2f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847d738c r4:847d7000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847d738c r4:85963c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bb3c00 r8:85963c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85963c00 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:ed769000 r4:84751480 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:489:6220 blocked for more than 478 seconds. r5:8598b000 r4:8291a680 r4:00000000 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8598b000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec501000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847d778c r4:847d7400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847d778c r4:85963d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8598b000 r8:85963d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85963d00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85963d00 r8:80287e08 r7:ecc15e60 r6:85963d80 r5:8598b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbb5fb0 to 0xecbb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8589b9c0 INFO: task kworker/1:489:6220 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 9a233000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 r5:00001000 r4:ed769000 r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc79e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589bec0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85995400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec541000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847d7b8c r4:847d7800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847d7b8c r4:85963e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85995400 r8:85963e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85963e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85963e00 r8:80287e08 r7:ecbb5e60 r6:85963e80 r5:85995400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc79fb0 to 0xecc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8589bac0 INFO: task kworker/1:490:6222 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 9a233000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 r5:80070013 r4:80239bb0 r4:e0035dc0 r5:00001000 r4:ed769000 r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 9a233000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:492:6226 blocked for more than 478 seconds. Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:847dc38c r4:85891000 r10:00000000 r9:85891000 r8:80287e08 r7:ecc7de60 r6:85891080 r5:859a0c00 task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80230ad0 80239bb0 80070013 ffffffff r4:e0035dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84751480 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:493 state:D stack:0 pid:6229 tgid:6229 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:859a1800 r8:8589112c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:82ac21e4 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:494:6230 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:494 state:D stack:0 pid:6230 tgid:6230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc85d84 r8:00000002 r7:60000113 r6:ecc85d8c r5:859a2400 r4:859a2400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859a2400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc85e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85897680 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec66f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847dcf8c r4:847dcc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847dcf8c r4:85891200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a2400 r8:8589122c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85891200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85891200 r8:80287e08 r7:ecc71e60 r6:85891280 r5:859a2400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc85fb0 to 0xecc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:858973c0 INFO: task kworker/1:494:6230 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 9a751000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 r5:00001000 r4:ed769000 r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:495 state:D stack:0 pid:6232 tgid:6232 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc89e08 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85891300 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:496:6234 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:496 state:D stack:0 pid:6234 tgid:6234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc8dd84 r8:00000002 r7:60000113 r6:ecc8dd8c r5:859a3c00 r4:859a3c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859a3c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc8de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:847dd38c r4:85891400 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d20: 9b09d000 dfe3d000 00000001 80239b98 7f159000 00000001 r4:e0035dc0 r5:00001000 r4:ed769000 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:497:6236 blocked for more than 478 seconds. r4:84aba400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc99e08 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84aba400 r8:8589152c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0035d28 to 0xe0035d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:ed769000 r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:498 state:D stack:0 pid:6237 tgid:6237 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc9de08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847dd78c r4:847dd400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847dd78c r4:85891580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a2ec00 r8:858915ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85891580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85891580 r8:80287e08 r7:ecc99e60 r6:85894280 r5:85a2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc9dfb0 to 0xecc9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85897500 INFO: task kworker/1:498:6237 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 9b181000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:499:6240 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:499 state:D stack:0 pid:6240 tgid:6240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecca9d84 r8:00000002 r7:60000113 r6:ecca9d8c r5:851c1800 r4:851c1800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c1800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecca9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85897a80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec78d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847ddb8c r4:847dd800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847ddb8c r4:85891600 r4:85891600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0035d28 to 0xe0035d70) r4:82ac21e4 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eccb1d84 r8:00000002 r7:60000013 r6:eccb1d8c r5:851c0000 r4:851c0000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c0000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccb1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85897f80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec865000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847deb8c r4:847de800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847deb8c r4:85891680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851c0000 r8:858916ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85891680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85891680 r8:80287e08 r7:ecc99e60 r6:85894380 r5:851c0000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccb1fb0 to 0xeccb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85897900 INFO: task kworker/1:500:6242 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 9bab0000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:8446a700 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:851c3000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85897d80 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r5:80070013 r4:80239bb0 r4:e0035dc0 r5:00001000 r4:ed769000 r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:502:6245 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:502 state:D stack:0 pid:6245 tgid:6245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eccbdd84 r8:00000002 r7:60000113 r6:eccbdd8c r5:851c2400 r4:851c2400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c2400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccbde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85897ec0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec831000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847de78c r4:847de400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847de78c r4:85891780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851c2400 r8:858917ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85891780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85891780 r8:80287e08 r7:eccb1e60 r6:85894480 r5:851c2400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccbdfb0 to 0xeccbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85897a00 INFO: task kworker/1:502:6245 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 9bcde000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:847df78c r4:847df400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85891800 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:859a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 r5:847def8c r4:847dec00 r10:61c88647 r9:859a4800 r8:858918ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85891880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85891880 r8:80287e08 r7:eccc9e60 r6:85891900 r5:859a4800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc91fb0 to 0xecc91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8595a5c0 INFO: task kworker/1:504:6249 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 9c01b000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:505:6252 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:505 state:D stack:0 pid:6252 tgid:6252 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:859a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 r5:847df38c r4:847df000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85891980 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 r4:84751480 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:859a6c00 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:847dfb8c r4:847df800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847dfb8c r4:85891a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a6c00 r8:85891aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85891a80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85891a80 r8:80287e08 r7:eccc9e60 r6:85891b00 r5:859a6c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccd5fb0 to 0xeccd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85875180 INFO: task kworker/1:506:6255 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 9c9ea000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:507:6256 blocked for more than 478 seconds. r10:8291a684 r9:ecc95d84 r8:00000002 r7:60000113 r6:ecc95d8c r5:859a0000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:847dff8c r4:847dfc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85891b80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0fb000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccfd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a8038c r4:85a80000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8038c r4:85891c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a6000 r8:85891cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85891c80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85891c80 r8:80287e08 r7:ecc95e60 r6:85891d00 r5:859a6000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccddfb0 to 0xeccddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85875380 INFO: task kworker/1:508:6258 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 9d1c2000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 r5:00001000 r4:ed769000 r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85a8078c r4:85a80400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85891d80 5fa0: 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:510 state:D stack:0 pid:6266 tgid:6266 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:511:6269 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:511 state:D stack:0 pid:6269 tgid:6269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd11d84 r8:00000002 r7:60000113 r6:ecd11d8c r5:859aa400 r4:859aa400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859aa400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd11e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85875f80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859aa400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadc3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a80f8c r4:85a80c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a80f8c r4:85891f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859aa400 r8:85891fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85891f80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85891f80 r8:80287e08 r7:eccd9e60 r6:85863000 r5:859aa400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d60: 80230ad0 80239bb0 80070013 ffffffff [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:85d27b8c r4:85d27800 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:851c4800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd1de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ee040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8f9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a81f8c r4:85a81c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a81f8c r4:85863080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851c4800 r8:858630ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85863080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85863080 r8:80287e08 r7:ecd11e60 r6:85894580 r5:851c4800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd1dfb0 to 0xecd1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85875e00 INFO: task kworker/1:512:6270 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:513:6272 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:513 state:D stack:0 pid:6272 tgid:6272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd25d84 r8:00000002 r7:60000113 r6:ecd25d8c r5:851c6c00 r4:851c6c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c6c00 r4:8291a680 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85a8138c r4:85a81000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:851c6c00 r8:8586312c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0035d28 to 0xe0035d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85a8178c r4:85a81400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85863180 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:82ac21e4 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 INFO: task kworker/1:515:6275 blocked for more than 478 seconds. r5:859ab000 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8d1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a81b8c r4:85a81800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a81b8c r4:85863200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859ab000 r8:8586322c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85863200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85863200 r8:80287e08 r7:ecd1de60 r6:85863280 r5:859ab000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd15fb0 to 0xecd15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8589be00 INFO: task kworker/1:515:6275 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 9f135000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:516:6278 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:516 state:D stack:0 pid:6278 tgid:6278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd39d84 r8:00000002 r7:60000013 r6:ecd39d8c r5:851c5400 r4:851c5400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c5400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a8238c r4:85a82000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xecd39fb0 to 0xecd39ff8) task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:85d27b8c r4:85d27800 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:517:6280 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:517 state:D stack:0 pid:6280 tgid:6280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd41d84 r8:00000002 r7:60000113 r6:ecd41d8c r5:85aa0c00 r4:85aa0c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85aa0c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd41e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ee400 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85aa0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec973000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a8278c r4:85a82400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8278c r4:85863380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85aa0c00 r8:858633ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85863380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85863380 r8:80287e08 r7:ecd39e60 r6:85894780 r5:85aa0c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd41fb0 to 0xecd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857ee1c0 INFO: task kworker/1:517:6280 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 9f741000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r5:85d27b8c r4:85d27800 r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) INFO: task kworker/1:518:6282 blocked for more than 478 seconds. r5:85aa2400 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85a8338c r4:85a83000 r7:ddde2d80 r6:83018200 r5:85a8338c r4:85863400 r10:00000000 r9:85863400 r8:80287e08 r7:ecd41e60 r6:85894800 r5:85aa2400 task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 9f741000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 Exception stack(0xe0035fb0 to 0xe0035ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ee580 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85aa0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec99d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a82b8c r4:85a82800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a82b8c r4:85863480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85aa0000 r8:858634ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85863480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85863480 r8:80287e08 r7:ecd49e60 r6:85894880 r5:85aa0000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd51fb0 to 0xecd51ff8) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:ecd55d84 r8:00000002 r7:60000113 r6:ecd55d8c r5:85aa3c00 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85a82f8c r4:85a82c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85863500 r8:80287e08 r7:ecd49e60 r6:85894900 r5:85aa3c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857ee380 INFO: task kworker/1:520:6285 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: 9fb20000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 Exception stack(0xe0035fb0 to 0xe0035ff8) INFO: task kworker/1:521:6287 blocked for more than 478 seconds. r5:85aa1800 r4:8291a680 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857eea40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85aa1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaed000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a8378c r4:85a83400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8378c r4:85863580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85aa1800 r8:858635ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85863580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85863580 r8:80287e08 r7:ecd49e60 r6:85894980 r5:85aa1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd59fb0 to 0xecd59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857ee780 INFO: task kworker/1:521:6287 is blocked on a mutex likely owned by task kworker/0:121:3615. [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:ed769000 r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:85aa4800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85aa4800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd4de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857eeb00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85aa4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e7000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaf9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a83b8c r4:85a83800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85aa4800 r8:8586362c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0035d28 to 0xe0035d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe0035fb0 to 0xe0035ff8) INFO: task kworker/1:523:6294 blocked for more than 478 seconds. r5:85aa6c00 r4:8291a680 r4:00000000 r4:00000000 r5:85a83f8c r4:85a83c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85863680 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:524:6296 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:524 state:D stack:0 pid:6296 tgid:6296 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd69d84 r8:00000002 r7:60000013 r6:ecd69d8c r5:85aa3000 r4:85aa3000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85aa3000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd69e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bf2c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85aa3000 r7:00000000 r6:83018200 r5:00001000 r4:7f101000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd8d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a8578c r4:85a85400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8578c r4:85863700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85aa3000 r8:8586372c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85863700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85863700 r8:80287e08 r7:ecd61e60 r6:85894b00 r5:85aa3000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd69fb0 to 0xecd69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857eea80 INFO: task kworker/1:524:6296 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:ed769000 r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) INFO: task kworker/1:525:6297 blocked for more than 479 seconds. r4:85aa6000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd6de08 r5:00001000 r4:ecbc7000 r5:85a8438c r4:85a84000 r7:ddde2d80 r6:83018200 r5:85a8438c r4:85863780 r10:00000000 r9:85863780 r8:80287e08 r7:ecd69e60 r6:85894b80 r5:85aa6000 r4:857eed00 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: a02ca000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:526:6299 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:526 state:D stack:0 pid:6299 tgid:6299 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd75d84 r8:00000002 r7:60000113 r6:ecd75d8c r5:85aa5400 r4:85aa5400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85aa5400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd75e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r4:00000000 r5:85a8478c r4:85a84400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8478c r4:85863800 r10:61c88647 r9:85aa5400 r8:8586382c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0035d28 to 0xe0035d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) INFO: task kworker/1:527:6301 blocked for more than 479 seconds. r4:851c6000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd7de08 r4:00000000 r5:85a84b8c r4:85a84800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85863880 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0035d28 to 0xe0035d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r5:00001000 r4:ed769000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe0035fb0 to 0xe0035ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85aa9800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd89e08 r9:83018205 r8:85aa9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0f3000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a84f8c r4:85a84c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a84f8c r4:85863900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85aa9800 r8:8586392c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85863900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85863900 r8:80287e08 r7:ecd69e60 r6:85894d00 r5:85aa9800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd89fb0 to 0xecd89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:858831c0 INFO: task kworker/1:528:6304 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: a0b09000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:529:6305 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:529 state:D stack:0 pid:6305 tgid:6305 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd91d84 r8:00000002 r7:60000113 r6:ecd91d8c r5:85aa8000 r4:85aa8000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85aa8000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd91e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bf040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85aa8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ff000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc33000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a8538c r4:85a85000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8538c r4:85863980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85aa8000 r8:858639ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85863980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:00000000 5d60: 80230ad0 80239bb0 80070013 ffffffff r4:e0035dc0 r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:ecd9dd84 r8:00000002 r7:60000113 r6:ecd9dd8c r5:85aa8c00 r4:00000000 r4:00000000 r5:00001000 r4:ecdf5000 r5:85a8738c r4:85a87000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857bf300 INFO: task kworker/1:530:6307 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: a0f49000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:531:6309 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:531 state:D stack:0 pid:6309 tgid:6309 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdb1d84 r8:00000002 r7:60000113 r6:ecdb1d8c r5:85aaa400 r4:85aaa400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85aaa400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdb1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bf440 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85aaa400 r7:00000000 r6:83018200 r5:00001000 r4:7f103000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecda1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a85b8c r4:85a85800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a85b8c r4:85863a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85aaa400 r8:85863aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85863a80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85863a80 r8:80287e08 r7:ecd9de60 r6:85894e80 r5:85aaa400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0035d28 to 0xe0035d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r5:00001000 r4:ed769000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:532 state:D stack:0 pid:6311 tgid:6311 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdc1e08 r9:83018205 r8:85aab000 r7:00000000 r6:83018200 r5:00001000 r4:7f105000 r5:85a85f8c r4:85a85c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xecdc1fb0 to 0xecdc1ff8) task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: a140e000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:533:6313 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:533 state:D stack:0 pid:6313 tgid:6313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdd1d84 r8:00000002 r7:60000013 r6:ecdd1d8c r5:85aad400 r4:85aad400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85aad400 r4:8291a680 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85a8638c r4:85a86000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8638c r4:85863b80 r4:85863b80 Exception stack(0xecdd1fb0 to 0xecdd1ff8) task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80230ad0 80239bb0 80070013 ffffffff [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85aac800 r4:8291a680 r4:00000000 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:85a8678c r4:85a86400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8678c r4:85863c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85aac800 r8:85863c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85863c00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85863c00 r8:80287e08 r7:ecd9de60 r6:856e6000 r5:85aac800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdd9fb0 to 0xecdd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857bf540 INFO: task kworker/1:534:6315 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: a1abc000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:535:6319 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:535 state:D stack:0 pid:6319 tgid:6319 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdfdd84 r8:00000002 r7:60000113 r6:ecdfdd8c r5:85aabc00 r4:85aabc00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85aabc00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bf980 r5:85a86b8c r4:85a86800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85863c80 dfa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0035d28 to 0xe0035d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r5:00001000 r4:ed769000 r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:84abec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece01e08 r9:83018205 r8:84abec00 r7:00000000 r6:83018200 r5:00001000 r4:7f10d000 r5:85a86f8c r4:85a86c00 r10:61c88647 r9:84abec00 r8:85863d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:537:6322 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:537 state:D stack:0 pid:6322 tgid:6322 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdd5d84 r8:00000002 r7:60000013 r6:ecdd5d8c r5:859ad400 r4:859ad400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859ad400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdd5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bffc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f115000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece21000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a87b8c r4:85a87800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a87b8c r4:85863d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859ad400 r8:85863dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85863d80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85863d80 r8:80287e08 r7:ecd9de60 r6:85863e00 r5:859ad400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdd5fb0 to 0xecdd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857bfac0 INFO: task kworker/1:537:6322 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: a1f6f000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:538:6323 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:538 state:D stack:0 pid:6323 tgid:6323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd2dd84 r8:00000002 r7:60000113 r6:ecd2dd8c r5:859ae000 r4:859ae000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859ae000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd2de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bfec0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f113000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece15000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a8778c r4:85a87400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8778c r4:85863e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859ae000 r8:85863eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85863e80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85863e80 r8:80287e08 r7:ecdd5e60 r6:85863f00 r5:859ae000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd2dfb0 to 0xecd2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857bfac0 INFO: task kworker/1:538:6323 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: a1f6f000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:85d27b8c r4:85d27800 r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece2dd84 r8:00000002 r7:60000113 r6:ece2dd8c r5:859ac800 r4:859ac800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859ac800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece2de08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ed940 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859ac800 r7:00000000 r6:83018200 r5:00001000 r4:7f117000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece29000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a87f8c r4:85a87c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a87f8c r4:85863f80 r10:61c88647 r9:859ac800 r8:85863fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) r4:8446a700 task:kworker/1:540 state:D stack:0 pid:6329 tgid:6329 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:85a8878c r4:85a88400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:859a8000 r8:856dc0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0035d28 to 0xe0035d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:541:6331 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:541 state:D stack:0 pid:6331 tgid:6331 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece19d84 r8:00000002 r7:60000113 r6:ece19d8c r5:859aec00 r4:859aec00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859aec00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece19e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446b500 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f119000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece35000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a8838c r4:85a88000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8838c r4:856dc180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859aec00 r8:856dc1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856dc180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856dc180 r8:80287e08 r7:ece39e60 r6:856dc200 r5:859aec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece19fb0 to 0xece19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0035d28 to 0xe0035d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r10:8291a684 r9:ece0dd84 r8:00000002 r7:60000113 r6:ece0dd8c r5:859abc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece0de08 r9:83018205 r8:859abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f11d000 r5:85a88b8c r4:85a88800 r7:ddde2d80 r6:83018200 r5:85a88b8c r4:856dc280 r10:00000000 r9:856dc280 r8:80287e08 r7:ece39e60 r6:856dc300 r5:859abc00 task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80230ad0 80239bb0 80070013 ffffffff [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:85d27b8c r4:85d27800 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:ece4dd84 r8:00000002 r7:60000113 r6:ece4dd8c r5:84bb4800 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85a8938c r4:85a89000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8938c r4:856dc380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bb4800 r8:856dc3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856dc380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856dc380 r8:80287e08 r7:ece0de60 r6:856dc400 r5:84bb4800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece4dfb0 to 0xece4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856ed080 INFO: task kworker/1:543:6335 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: a3225000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:544:6337 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:544 state:D stack:0 pid:6337 tgid:6337 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece59d84 r8:00000002 r7:60000013 r6:ece59d8c r5:859b0000 r4:859b0000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859b0000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85a88f8c r4:85a88c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:856dc480 Exception stack(0xece59fb0 to 0xece59ff8) task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80230ad0 80239bb0 80070013 ffffffff r4:e0035dc0 r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe0035fb0 to 0xe0035ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:859b0c00 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a8978c r4:85a89400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8978c r4:856dc580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859b0c00 r8:856dc5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856dc580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856dc580 r8:80287e08 r7:ece4de60 r6:856dc600 r5:859b0c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece65fb0 to 0xece65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856ed3c0 INFO: task kworker/1:545:6339 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: a3392000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:546:6341 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:546 state:D stack:0 pid:6341 tgid:6341 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece71d84 r8:00000002 r7:60000113 r6:ece71d8c r5:859b1800 r4:859b1800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859b1800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece71e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856edbc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f129000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a8a38c r4:85a8a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8a38c r4:856dc680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859b1800 r8:856dc6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856dc680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r5:85d27b8c r4:85d27800 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:8446a700 task:kworker/1:547 state:D stack:0 pid:6343 tgid:6343 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece7de08 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a89b8c r4:85a89800 r10:61c88647 r9:859b2400 r8:856dc7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 r4:00000000 r5:85d27b8c r4:85d27800 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:859b3000 r4:8291a680 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece89e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856eda40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f127000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece85000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a89f8c r4:85a89c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a89f8c r4:856dc880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859b3000 r8:856dc8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856dc880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856dc880 r8:80287e08 r7:ece71e60 r6:856dc900 r5:859b3000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece89fb0 to 0xece89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856ed8c0 INFO: task kworker/1:548:6345 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: a3cb4000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85a8a78c r4:856dc980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:856ed9c0 Workqueue: events bpf_prog_free_deferred 5d20: a4277000 dfe3d000 00000001 80239b98 7f159000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:550:6349 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:550 state:D stack:0 pid:6349 tgid:6349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eceadd84 r8:00000002 r7:60000113 r6:eceadd8c r5:859b5400 r4:859b5400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859b5400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceade08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85636380 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb43000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a8af8c r4:85a8ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8af8c r4:856dca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859b5400 r8:856dcaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856dca80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856dca80 r8:80287e08 r7:ece95e60 r6:856dcb00 r5:859b5400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceadfb0 to 0xeceadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856edb40 INFO: task kworker/1:550:6349 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: a4277000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:8446a700 task:kworker/1:551 state:D stack:0 pid:6351 tgid:6351 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecec5e08 r9:83018205 r8:859b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f12f000 r5:85a8ab8c r4:85a8a800 r7:ddde2d80 r6:83018200 r5:85a8ab8c r4:856dcb80 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85636000 INFO: task kworker/1:551:6351 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: a4277000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:8446a700 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a8b38c r4:85a8b000 r10:61c88647 r9:851d1800 r8:856dccac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 5d60: 80230ad0 80239bb0 80070013 ffffffff r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85a8b78c r4:85a8b400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8b78c r4:856dcd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851d0c00 r8:856dcd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856dcd00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856dcd00 r8:80287e08 r7:eccb9e60 r6:856e6200 r5:851d0c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecec9fb0 to 0xecec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85636300 INFO: task kworker/1:553:6356 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: a4729000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:554:6357 blocked for more than 479 seconds. [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r9:83018205 r8:851d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 r5:85a8bb8c r4:85a8b800 r4:856dcd80 Exception stack(0xececdfb0 to 0xececdff8) Workqueue: events bpf_prog_free_deferred 5d20: a4729000 dfe3d000 00000001 80239b98 7f159000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:555:6359 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:555 state:D stack:0 pid:6359 tgid:6359 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eced5d84 r8:00000002 r7:60000013 r6:eced5d8c r5:851d4800 r4:851d4800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851d4800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eced5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85636b80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a9078c r4:85a90400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a9078c r4:856dce00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851d4800 r8:856dce2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856dce00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856dce00 r8:80287e08 r7:ececde60 r6:856e6300 r5:851d4800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeced5fb0 to 0xeced5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856364c0 Workqueue: events bpf_prog_free_deferred 5d20: a4729000 dfe3d000 00000001 80239b98 7f159000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 INFO: task kworker/1:556:6361 blocked for more than 479 seconds. Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eceddd84 r8:00000002 r7:60000113 r6:eceddd8c r5:851d3c00 r4:851d3c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851d3c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecedde08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856368c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb86d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a8bf8c r4:85a8bc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a8bf8c r4:856dce80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851d3c00 r8:856dceac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856dce80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856dce80 r8:80287e08 r7:eced5e60 r6:856e6380 r5:851d3c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceddfb0 to 0xeceddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856366c0 INFO: task kworker/1:556:6361 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 5d20: a5318000 dfe3d000 00000001 80239b98 7f159000 00000001 r4:00000000 r5:85d27b8c r4:85d27800 r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) INFO: task kworker/1:557:6364 blocked for more than 479 seconds. r10:8291a684 r9:ecee5d84 r8:00000002 r7:60000013 r6:ecee5d8c r5:851d6000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85636a80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851d6000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9f7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a9038c r4:85a90000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a9038c r4:856dcf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851d6000 r8:856dcf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856dcf00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856dcf00 r8:80287e08 r7:eced5e60 r6:856e6400 r5:851d6000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85a90f8c r4:856dcf80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecee9fb0 to 0xecee9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85636980 INFO: task kworker/1:558:6367 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: a55b2000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:559:6368 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:559 state:D stack:0 pid:6368 tgid:6368 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eceedd84 r8:00000002 r7:60000013 r6:eceedd8c r5:851d6c00 r4:851d6c00 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851d6c00 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceede08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85636c40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:851d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb59000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a90b8c r4:85a90800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a90b8c r4:8562f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851d6c00 r8:8562f02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8562f000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f000 r8:80287e08 r7:ecee9e60 r6:856e6500 r5:851d6c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceedfb0 to 0xeceedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85636cc0 INFO: task kworker/1:559:6368 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: a55b2000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:ecef5d84 r8:00000002 r7:60000113 r6:ecef5d8c r5:851d0000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85a92f8c r4:8562f080 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85636c00 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 5d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:561:6372 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:561 state:D stack:0 pid:6372 tgid:6372 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecef9d84 r8:00000002 r7:60000113 r6:ecef9d8c r5:85aae000 r4:85aae000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85aae000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecef9e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85636f00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85aae000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbef000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a9138c r4:85a91000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a9138c r4:8562f100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85aae000 r8:8562f12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8562f100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f100 r8:80287e08 r7:ecef5e60 r6:856e6600 r5:85aae000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecef9fb0 to 0xecef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85636c00 INFO: task kworker/1:561:6372 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:84898000 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85a9178c r4:8562f180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84898000 r8:8562f1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8562f180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f180 r8:80287e08 r7:ecef5e60 r6:856e6680 r5:84898000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf01fb0 to 0xecf01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:856ede80 INFO: task kworker/1:562:6374 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: a5ec6000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:8446a700 task:kworker/1:563 state:D stack:0 pid:6377 tgid:6377 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:85a91b8c r4:85a91800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a91b8c r4:8562f200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8489a400 r8:8562f22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8562f200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f200 r8:80287e08 r7:ecef5e60 r6:856e6700 r5:8489a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf0dfb0 to 0xecf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85636e40 INFO: task kworker/1:563:6377 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: a5ec6000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:8446a700 task:kworker/1:564 state:D stack:0 pid:6378 tgid:6378 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85a9238c r4:8562f280 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 5d20: a64fd000 dfe3d000 00000001 80239b98 7f159000 00000001 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 INFO: task kworker/1:565:6383 blocked for more than 479 seconds. r4:84898c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf19e08 r9:83018205 r8:84898c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec697000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a9278c r4:85a92400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a9278c r4:8562f380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84898c00 r8:8562f3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8562f380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f380 r8:80287e08 r7:ecef5e60 r6:856e6780 r5:84898c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf19fb0 to 0xecf19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85618200 INFO: task kworker/1:565:6383 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: a64fd000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:ecf1dd84 r8:00000002 r7:60000113 r6:ecf1dd8c r5:8489bc00 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8489bc00 r8:8562f42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:567:6386 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:567 state:D stack:0 pid:6386 tgid:6386 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf25d84 r8:00000002 r7:60000113 r6:ecf25d8c r5:84899800 r4:84899800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84899800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf25e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85618940 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84899800 r7:00000000 r6:83018200 r5:00001000 r4:7f027000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a9378c r4:85a93400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a9378c r4:8562f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84899800 r8:8562f4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8562f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f480 r8:80287e08 r7:ecef5e60 r6:856e6880 r5:84899800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf25fb0 to 0xecf25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85618380 INFO: task kworker/1:567:6386 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 5d20: a6eda000 dfe3d000 00000001 80239b98 7f159000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 INFO: task kworker/1:568:6388 blocked for more than 479 seconds. r4:8489e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf2de08 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85a9338c r4:8562f500 r4:00000001 r4:85618540 Workqueue: events bpf_prog_free_deferred 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 r4:00000000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:569:6390 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:569 state:D stack:0 pid:6390 tgid:6390 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf35d84 r8:00000002 r7:60000113 r6:ecf35d8c r5:8489d400 r4:8489d400 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8489d400 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf35e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85618900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8489d400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec88f000 r5:85a9438c r4:85a94000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8489d400 r8:8562f5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) INFO: task kworker/1:570:6393 blocked for more than 479 seconds. r10:8291a684 r9:ecd21d84 r8:00000002 r7:60000113 r6:ecd21d8c r5:8489ec00 r4:00000000 r4:00000000 r5:85a93b8c r4:85a93800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8562f600 r8:80287e08 r7:ecf35e60 r6:856e6a00 r5:8489ec00 task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 Exception stack(0xe0035fb0 to 0xe0035ff8) INFO: task kworker/1:571:6395 blocked for more than 479 seconds. [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:85a93f8c r4:85a93c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a93f8c r4:8562f680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851d2400 r8:8562f6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8562f680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f680 r8:80287e08 r7:ecf35e60 r6:856e6a80 r5:851d2400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd3dfb0 to 0xecd3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85618900 INFO: task kworker/1:571:6395 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: a750b000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:572:6398 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:572 state:D stack:0 pid:6398 tgid:6398 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd95d84 r8:00000002 r7:60000013 r6:ecd95d8c r5:85261800 r4:85261800 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85261800 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd95e08 r4:00000000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a9478c r4:85a94400 r10:61c88647 r9:85261800 r8:8562f72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r4:00000000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:573:6399 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:573 state:D stack:0 pid:6399 tgid:6399 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdb5d84 r8:00000002 r7:60000113 r6:ecdb5d8c r5:85260000 r4:85260000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85260000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdb5e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85618f80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85260000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8f7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a94b8c r4:85a94800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a94b8c r4:8562f780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8562f780 r8:80287e08 r7:ecd95e60 r6:856e6b80 r5:85260000 Workqueue: events bpf_prog_free_deferred [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:8446a700 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85a94f8c r4:85a94c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85618d00 Workqueue: events bpf_prog_free_deferred 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 r4:00000000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 INFO: task kworker/1:575:6403 blocked for more than 479 seconds. [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecea1e08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85618f00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec98d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a9538c r4:85a95000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a9538c r4:8562f900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859b8c00 r8:8562f92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8562f900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f900 r8:80287e08 r7:ecf09e60 r6:8562f980 r5:859b8c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecea1fb0 to 0xecea1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8562ae80 INFO: task kworker/1:575:6403 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: a7e79000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:576:6405 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:859ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 r5:85a95b8c r4:85a95800 r10:61c88647 r9:859ba400 r8:8562fa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 r4:00000001 r4:8446a700 task:kworker/1:577 state:D stack:0 pid:6407 tgid:6407 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:859bb000 r8:8562fb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: a82a1000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:578:6409 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:578 state:D stack:0 pid:6409 tgid:6409 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdedd84 r8:00000002 r7:60000113 r6:ecdedd8c r5:859b8000 r4:859b8000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859b8000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdede08 r4:00000000 [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558c600 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaa3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a95f8c r4:85a95c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a95f8c r4:8562fc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859b8000 r8:8562fc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8562fc00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562fc00 r8:80287e08 r7:ecdc5e60 r6:8562fc80 r5:859b8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdedfb0 to 0xecdedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad0 80239bb0 80070013 ffffffff r4:e0035dc0 r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85260c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 r5:85a96b8c r4:85a96800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a96b8c r4:8562fd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85260c00 r8:8562fd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8562fd00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562fd00 r8:80287e08 r7:ecdede60 r6:856e6c00 r5:85260c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdf9fb0 to 0xecdf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8558c4c0 INFO: task kworker/1:579:6411 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: a89d1000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8446a700 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:580:6413 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:580 state:D stack:0 pid:6413 tgid:6413 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a536a8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecebdd84 r8:00000002 r7:60000113 r6:ecebdd8c r5:85263000 r4:85263000 [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85263000 r4:8291a680 [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a9638c r4:85a96000 r10:61c88647 r9:85263000 r8:8562fdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 5d60: 80230ad0 80239bb0 80070013 ffffffff r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e53900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed769000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d27b8c r4:85d27800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d27b8c r4:84751480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:847514ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84751480 r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85263c00 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a9678c r4:85a96400 r7:ddde2d80 r6:83018200 r5:85a9678c r4:8562fe00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 5d20: a8b61000 dfe3d000 00000001 80239b98 7f159000 00000001 r4:e0035dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84751480 r8:80287e08 r7:dffe1e60 r6:84751500 r5:84b2ec00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:85266000 r4:8291a680 [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85a96f8c r4:8562fe80 r4:00000001 Exception stack(0xecf45fb0 to 0xecf45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8558c840 INFO: task kworker/1:582:6418 is blocked on a mutex likely owned by task kworker/0:121:3615. task:kworker/0:121 state:R running task stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b2ec00 r8:80200be4 r7:e0035d5c r6:ffffffff r5:84b2ec00 r4:00000000 [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0035d28 to 0xe0035d70) 5d20: a8d4a000 dfe3d000 00000001 80239b98 7f159000 00000001 5d40: 82ac15a0 7f159000 dfe3d000 8280c928 82ac21c4 e0035da4 e0035da8 e0035d78 5d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0035dc0 r5:e0035e08 r4:e0035dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372)